[go: up one dir, main page]

WO2023246060A1 - User authentication and authorization method and apparatus, and medium and device - Google Patents

User authentication and authorization method and apparatus, and medium and device Download PDF

Info

Publication number
WO2023246060A1
WO2023246060A1 PCT/CN2022/142487 CN2022142487W WO2023246060A1 WO 2023246060 A1 WO2023246060 A1 WO 2023246060A1 CN 2022142487 W CN2022142487 W CN 2022142487W WO 2023246060 A1 WO2023246060 A1 WO 2023246060A1
Authority
WO
WIPO (PCT)
Prior art keywords
cloud
cloud service
authentication
service authentication
network interoperability
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2022/142487
Other languages
French (fr)
Chinese (zh)
Inventor
李阳春
刘艺
林宝洪
黄志兰
樊勇兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Publication of WO2023246060A1 publication Critical patent/WO2023246060A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Definitions

  • the present disclosure relates to the field of communication technology and the field of cloud computing, and in particular to a user authentication and authorization method, a user authentication and authorization device, a computer-readable storage medium and an electronic device.
  • Authentication and authorization of user terminals is an indispensable and important link in the process of user terminals using access services or cloud services.
  • cloud service authentication and cloud resource authorization are independent of the authentication service process on the access side.
  • the authorization information returned by the authentication server is usually only related to the access service or data channel, such as IP (Internet Protocol) allocation, port, MTU (Maximum Transmission Unit, maximum transmission unit), PPP (Point to Point Protocol, Point-to-point protocols), etc., do not involve cloud resource application and activation, cloud service activation and other services.
  • IP Internet Protocol
  • MTU Maximum Transmission Unit, maximum transmission unit
  • PPP Point to Point Protocol, Point-to-point protocols
  • a user authentication and authorization processing method is provided, which is applied to network access and cloud service authentication and cloud resource authorization.
  • the method includes: in response to receiving an authentication request sent by an access gateway, performing Access authentication of the user terminal, wherein the authentication request is generated by the user terminal and sent to the access gateway; initiating a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module is based on the cloud service authentication module.
  • the service authentication request performs cloud service authentication of the user terminal; and initiates a cloud network interoperability detection request to the cloud network interoperability detection module, so that the cloud network interoperability detection module performs cloud network interoperability detection request of the user terminal based on the cloud network interoperability detection request.
  • Network interoperability detection is provided, which is applied to network access and cloud service authentication and cloud resource authorization.
  • initiating a cloud service authentication request to the cloud service authentication module so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request includes: Send a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module obtains cloud service authentication information based on the cloud service authentication request, and performs cloud service authentication of the user terminal based on the cloud service authentication information.
  • the cloud service authentication module after receiving the cloud service authentication request, the cloud service authentication module initializes the cloud service authentication information corresponding to the user terminal, and completes the cloud service authentication information based on the cloud service authentication information.
  • Cloud service authentication of the user terminal obtains cloud resource authorization parameters, and returns the cloud service authentication result and the cloud resource authorization parameters to the authentication server.
  • the cloud network interoperability detection request is initiated to the cloud network interoperability detection module, so that the cloud network interoperability detection module performs cloud network interoperability detection on the user terminal based on the cloud network interoperability detection request.
  • Interoperability detection includes: initiating a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module obtains cloud-network interoperability detection parameters based on the cloud-network interoperability detection request, and detects cloud-network interoperability based on the cloud-network interoperability detection module. Parameters are used to detect cloud-network interoperability of the user terminal.
  • the cloud network interoperability detection module after receiving the cloud network interoperability detection request, the cloud network interoperability detection module initializes the detection record of the user terminal, and determines the cloud network interoperability detection parameter according to the cloud network interoperability detection parameter. Interoperability detection strategy, and deliver the parameter information of the cloud resource pool access end and the cloud network interoperability detection strategy to the access gateway, so that the access gateway provides the cloud resource pool with an interoperability detection strategy based on the cloud network interoperability detection strategy.
  • the access terminal initiates cloud-network interoperability detection and returns the cloud-network interoperability detection result to the cloud-network interoperability detection module.
  • the method further includes: returning the access authentication result and access authorization parameter corresponding to the user terminal to the access Gateway, so that the access gateway configures according to the access authentication result and the access authorization parameter.
  • the method further includes: receiving the cloud service authentication result and cloud resources corresponding to the user terminal returned by the cloud service authentication module.
  • Authorization parameters Return the cloud service authentication result and the cloud resource authorization parameter corresponding to the user terminal to the access gateway, so that the access gateway Configure resource authorization parameters.
  • the method further includes: receiving the cloud network interoperability detection result corresponding to the user terminal returned by the cloud network interoperability detection module, and converting the cloud network interoperability detection result corresponding to the user terminal into The interoperability detection result is returned to the access gateway, so that the access gateway configures according to the cloud network interoperability detection result.
  • a user authentication and authorization processing device which is applied to network access and cloud service authentication and cloud resource authorization.
  • the device includes: an access authentication module, configured to respond to receiving the The authentication request sent by the gateway performs access authentication of the user terminal, where the authentication request is generated by the user terminal and sent to the access gateway; a cloud service authentication initiation module is used to initiate cloud services to the cloud service authentication module Authentication request, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request; a cloud network interoperability detection initiation module, used to initiate a cloud network interoperability detection request to the cloud network interoperability detection module, So that the cloud network interoperability detection module performs cloud network interoperability detection of the user terminal based on the cloud network interoperability detection request.
  • a computer-readable storage medium on which a computer program is stored.
  • the computer program is executed by a processor, the above-mentioned user authentication and authorization processing method is implemented.
  • an electronic device including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the operation via executing the executable instructions. Execute the above user authentication and authorization processing method.
  • Figure 1 shows the system architecture executed by a user authentication and authorization processing method in this exemplary embodiment
  • Figure 2 shows a flow chart of a user authentication and authorization processing method in this exemplary embodiment
  • Figure 3 shows an access authentication flow chart executed by the authentication server in this exemplary embodiment
  • Figure 4 shows a cloud service authentication flow chart executed by the cloud service authentication module in this exemplary embodiment
  • Figure 5 shows a flow chart of feedback of cloud-network interoperability detection results executed by the cloud-network interoperability detection module in this exemplary embodiment
  • Figure 6 shows an interaction example diagram of user authentication and authorization in this exemplary embodiment
  • Figure 7 shows a structural block diagram of a user authentication and authorization processing device in this exemplary embodiment
  • FIG. 8 shows an electronic device used to implement the above user authentication and authorization processing method in this exemplary embodiment.
  • Example embodiments will now be described more fully with reference to the accompanying drawings.
  • Example embodiments may, however, be embodied in various forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concepts of the example embodiments.
  • the described features, structures or characteristics may be combined in any suitable manner in one or more embodiments.
  • numerous specific details are provided to provide a thorough understanding of embodiments of the disclosure.
  • those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details described, or other methods, components, devices, steps, etc. may be adopted.
  • well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the disclosure.
  • access authentication and authorization, cloud service authentication and authorization adopt independent processes, lacking coordination, and user terminals need to complete authentication twice.
  • This method may have the following problems: it is inconvenient for users; the authentication information is fragmented, which increases security risks; the authentication channel and access channel of the cloud business are not guaranteed to be consistent, and the cloud business authentication and authorization cannot guarantee that the cloud business is available; it is not conducive to implementation
  • the synergistic advantages of access service providers and cloud service providers may have the following problems: it is inconvenient for users; the authentication information is fragmented, which increases security risks; the authentication channel and access channel of the cloud business are not guaranteed to be consistent, and the cloud business authentication and authorization cannot guarantee that the cloud business is available; it is not conducive to implementation
  • the synergistic advantages of access service providers and cloud service providers are examples of access service providers and cloud service providers.
  • exemplary embodiments of the present disclosure provide a user authentication authorization processing method. This user authentication and authorization processing method can be applied to scenarios where user terminals use access services and cloud services at the same time.
  • the user authentication and authorization processing method can be deployed in the network architecture 100 shown in Figure 1 and executed by the authentication server 110 in the network architecture 100.
  • the network architecture 100 may include: an authentication server 110, a cloud service authentication module 120, a cloud network interoperability detection module 130, an access gateway 140, a user terminal 150, and a cloud resource pool access terminal 160.
  • the authentication server 110 includes but is not limited to AAA server or DN-AAA (Data Network-Authentication, Authorization, Accounting) server of the 5G network, etc., and can be connected with the cloud service authentication module 120, the cloud network interoperability detection module 130 and the access gateway. 140 communicates, can receive the authentication request sent by the access gateway 140, can obtain the cloud service authentication results and cloud resource authorization parameters and other data returned by the cloud service authentication module 120, and can obtain the access data returned by the cloud network interoperability detection module 130. Data such as interoperability detection results between the gateway and cloud resources can also be returned to the access gateway 140, such as authorization information.
  • the cloud service authentication module 120 may be responsible for cloud service authentication, generating and maintaining cloud resource authorization parameters.
  • the cloud network interoperability detection module 130 may be responsible for detecting and maintaining network connectivity between the access gateway 140 and the cloud resource pool access terminal 160, and returning the detection results to the authentication server.
  • the access gateway 140 can send the authentication request to the authentication server 110 when the user terminal 150 initiates the authentication request, and obtain access authorization parameters, cloud resource authorization parameters, cloud network interoperability detection results and other information from the authentication server 110 to complete the access.
  • the user terminal 150 can be mounted on smart devices capable of network communication, such as smartphones, computers, smart monitoring systems, and vehicle-mounted systems.
  • the cloud resource pool access terminal 160 can provide cloud resource access services.
  • FIG. 2 shows a schematic flow of a user authentication and authorization processing method in this exemplary embodiment. It is applied to network access and cloud service authentication and cloud resource authorization, and may include the following steps S210 to step S230:
  • Step S210 In response to receiving the authentication request sent by the access gateway, perform access authentication of the user terminal, where the authentication request is generated by the user terminal and sent to the access gateway;
  • Step S220 Initiate a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request;
  • Step S230 Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection request.
  • Step S210 In response to receiving the authentication request sent by the access gateway, perform access authentication of the user terminal, where the authentication request is generated by the user terminal and sent to the access gateway.
  • the user terminal can initiate authentication to the access gateway, and the access gateway sends the authentication request of the user terminal to the authentication server. After receiving the authentication request sent by the access gateway, the authentication server can perform access authentication on the user terminal. .
  • the above-mentioned access authentication of the user terminal can be implemented through the following steps: parsing the authentication request to obtain the access authentication information; performing access authentication on the user terminal based on the access authentication information.
  • the access authentication information includes but is not limited to user name, user account and other information. The details can be determined by the access authentication mechanism configured by the authentication server, and are not specifically limited here.
  • the authentication server can return the access authentication result to the access gateway, so that the access gateway can feed back the access authentication result to the user terminal.
  • the following steps may also be performed: return the access authentication result and access authorization parameters corresponding to the user terminal to the access gateway, so that the access The gateway is configured based on the access authentication results and access authorization parameters.
  • the authentication server can feed back access authentication passing information and access authorization parameters to the access gateway, so that the access gateway can configure the access authorization parameters for the user terminal, so that the user terminal can Use access services normally.
  • the authentication server can directly return access authentication failure information to the access gateway, and the access gateway feeds back the access authentication failure information to the user terminal to end this authentication and authorization process. .
  • an access authentication flow chart executed by an authentication server is provided, which may include the following steps:
  • Step S301 Receive the authentication request sent by the access gateway
  • Step S302 parse the authentication information to obtain access authentication information
  • Step S303 Perform access authentication on the user terminal according to the access authentication information
  • Step S304 Determine whether the access authentication passes. If it passes, execute step S305. If it fails, execute step S306;
  • Step S305 Return access authentication passing information and access authorization parameters to the access gateway
  • Step S306 Return access authentication failure information to the access gateway.
  • the access authentication result and access authorization parameters can be returned to the access gateway in real time. You can also wait for the execution of steps S220 and S230 to complete. The information that needs to be returned to the access gateway is returned together to reduce the number of communications.
  • the authentication server can determine whether the user terminal has cloud services. If not, it can directly return the access authentication result to the access gateway; if so, it can continue to step S220 with reference to Figure 2.
  • Step S220 Initiate a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request.
  • the authentication server may initiate a cloud service authentication request to the cloud service authentication module after determining that the user terminal has the cloud service. After receiving the cloud service authentication request, the cloud service authentication module can perform cloud service authentication on the user terminal according to the received cloud service authentication request.
  • the above-mentioned initiating a cloud service authentication request to the cloud service authentication module so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request.
  • this can be achieved through the following steps:
  • the cloud service authentication module sends a cloud service authentication request, so that the cloud service authentication module obtains cloud service authentication information based on the cloud service authentication request, and performs cloud service authentication of the user terminal based on the cloud service authentication information.
  • Cloud service authentication information may include, but is not limited to, part or all of user name, password, cloud service identifier, cloud service domain name, cloud service IP address and other information.
  • the authentication server can directly use the user name and password of the user connected to the user terminal as the cloud service authentication information.
  • the details can be determined by the cloud service authentication mechanism configured in the cloud service authentication module, which is not specifically limited here.
  • the authentication server can generate cloud service authentication information based on the access information, append the cloud service authentication information to the cloud service authentication request, and send the cloud service authentication request with the cloud service authentication information appended to the cloud service authentication module.
  • the cloud service authentication module can obtain the cloud service authentication information by parsing the cloud service authentication request, and perform cloud service authentication on the user terminal based on the cloud service authentication information.
  • the access information may include the access user's user name, password, session ID, user identity, and information obtained by the authentication server after completing user access authentication.
  • the authentication server may append the access authentication information to the cloud service authentication request, and send the cloud service authentication request to the cloud service authentication module.
  • the cloud service authentication module obtains access authentication information by parsing the cloud service authentication request; generates cloud service authentication information based on the access authentication information; and performs cloud service authentication on the user terminal based on the cloud service authentication information.
  • the authentication server may send the cloud service authentication request to the cloud service authentication module.
  • the cloud service authentication module can respond to the received cloud service authentication request, query the local cache, obtain the historical authentication record of the user accessed by the user terminal, and obtain the cloud service authentication information based on the historical authentication record; verify the user based on the cloud service authentication information
  • the terminal performs cloud service authentication.
  • the authentication server may send the cloud service authentication request to the cloud service authentication module.
  • the cloud service authentication module can respond to the received cloud service authentication request, obtain cloud service authentication information from a third-party module or through external API (Application Programming Interface, application programming interface) configuration; perform authentication on the user terminal based on the cloud service authentication information Cloud business certification.
  • the third-party module represents a source of cloud service authentication information, such as an external system used to manage and maintain users' cloud service authentication information.
  • the authentication server realizes the cloud service authentication of the user terminal through interaction with the cloud service authentication module, connecting the access authentication service and the cloud service authentication service to simplify the user authentication and authorization process, thereby improving user authentication and authorization. s efficiency.
  • the cloud service authentication module can also initialize the cloud service authentication information corresponding to the user terminal; complete the cloud service authentication of the user terminal according to the cloud service authentication information, obtain the cloud resource authorization parameters; and return the cloud service to the authentication server. Authentication results and cloud resource authorization parameters, so that the subsequent authentication server can feed back the cloud service authentication results and cloud resource authorization parameters to the access gateway.
  • the following steps may also be performed: receiving the cloud service authentication result and cloud resource authorization parameters corresponding to the user terminal returned by the cloud service authentication module; The corresponding cloud service authentication result and cloud resource authorization parameters are returned to the access gateway, so that the access gateway performs configuration according to the cloud service authentication result and cloud resource authorization parameters.
  • the cloud service authentication module can return the cloud service authentication passing information and cloud resource authorization parameters to the authentication server, and feed back the cloud service authentication passing information and cloud resource authorization parameters to the access gateway through the authentication server. , so that the access gateway can configure the cloud resource authorization parameters for the user terminal, so that the user terminal can use cloud services normally.
  • the information returned by the cloud service authentication module to the authentication server may also include but is not limited to: some or all of the cloud service identifier, cloud service domain name and other information.
  • Cloud resource authorization parameters may include but are not limited to some or all of the following information:
  • Resource type such as virtual machine, container/pod, physical machine
  • vCPU Virtual Central Processing Unit, virtual processor
  • memory storage and other parameters.
  • a pod can be viewed as a collection of containers.
  • the cloud service authentication module can directly return the cloud service authentication failed information to the authentication server, and the authentication server returns the cloud service authentication failed information to the user terminal through the access gateway to end this section. Sub-authentication and authorization process.
  • a cloud service authentication flow chart executed by the cloud service authentication module is provided, which may include the following steps:
  • Step S401 In response to the received cloud service authentication request, perform cloud service authentication
  • Step S402 obtain cloud service authentication results and cloud resource authorization parameters
  • Step S403 Determine whether the cloud service authentication result passes. If it passes, execute step S404. If it fails, execute step S405;
  • Step S404 Return cloud service authentication passing information and cloud resource authorization parameters to the authentication server;
  • Step S405 Return cloud service authentication failure information to the authentication server.
  • the authentication server can return the cloud service authentication results and cloud resource authorization parameters to the access gateway in real time if the cloud service authentication passes. It can also wait for the completion of step S230 and return the required information. The information to the access gateway is returned together to reduce the number of communications.
  • step S230 to perform cloud network interoperability detection.
  • Step S230 Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection request.
  • the authentication server can send a cloud-network interoperability detection request to the cloud-network interoperability detection module.
  • the cloud network interoperability detection module can perform cloud network interoperability detection on the user terminal according to the cloud network interoperability detection request.
  • the above-mentioned method of initiating a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection of the user terminal based on the cloud-network interoperability detection request can be done in the following manner To achieve: Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module obtains the cloud-network interoperability detection parameters based on the cloud-network interoperability detection request, and performs cloud-network interoperability of the user terminal based on the cloud-network interoperability detection parameters. detection.
  • the parameters carried by the cloud network interoperability detection request may include but are not limited to: user identity, access gateway parameters (such as IP address, etc.), cloud service identifier, cloud service domain name, cloud service IP address, cloud resource authorization parameters and other information Part or all of it can be determined by the cloud-network interoperability detection mechanism configured in the cloud-network interoperability detection module, and there is no specific limit here.
  • a flow chart of feedback of cloud-network interoperability detection results executed by the cloud-network interoperability detection module is provided, which may include the following steps:
  • Step S501 After receiving the cloud-network interoperability detection request, the cloud-network interoperability detection parameters can be obtained by parsing the cloud-network interoperability detection request;
  • Step S502 determine whether the preset detection period is met, if not, continue to step S503, if so, jump to step S504;
  • Step S503 query the locally stored historical detection records of the previous detection cycle
  • Step S504 determine whether the historical detection record is queried, if not, continue to step S505, if so, jump to step S506;
  • Step S505 Initiate cloud-network interoperability detection, receive cloud-network interoperability detection results, and update detection records;
  • Step S506 Return the cloud network interoperability detection results.
  • Historical detection records include but are not limited to the following parameters: source parameters, destination parameters, detection methods, and detection results.
  • the source end and the destination end can respectively refer to the access gateway and the cloud resource pool access end.
  • the source end parameters can be, for example, the IP address of the access gateway, and the destination end parameters can be, for example, the domain name and IP address of the cloud resource pool access end;
  • the detection method can be Including but not limited to ping, HTTP (Hyper Text Transfer Protocol, Hypertext Transfer Protocol) access, etc.; detection results include but are not limited to the average of single or multiple detection results obtained during the detection process, such as delay, packet loss rate average etc.
  • ping can be used to determine whether the source end can successfully exchange (send and receive) data packets with the destination end, and then based on the returned information, infer whether the TCP/IP parameters are set correctly, whether the operation is normal, whether the network is smooth, etc.
  • HTTP is a request-response protocol that usually runs on top of the TCP protocol and can specify the messages that the source end may send to the destination end and the response received.
  • the cloud-network interoperability detection module does not need to perform cloud-network interoperability detection every time, which can shorten the time for returning cloud-network interoperability detection results to a certain extent and further improve User authentication and authorization efficiency.
  • the cloud-network interoperability detection can also be performed after receiving the cloud-network interoperability detection request to obtain the latest detection results.
  • the two methods of periodic detection and real-time detection can be set according to actual needs, and there are no specific limitations here.
  • the cloud-network interoperability detection module can obtain the cloud-network interoperability detection parameters through any of the following methods, which are not specifically limited here.
  • the authentication server can obtain the cloud-network interoperability detection parameters from the access authentication information, cloud service authentication information, and cloud resource authorization parameters, and append the cloud-network interoperability detection parameters to the cloud-network interoperability detection request and send it to the cloud-network interoperability detection module.
  • the cloud-network interoperability detection module can obtain the cloud-network interoperability detection parameters by parsing the cloud-network interoperability detection request.
  • the authentication server can append access authentication information, cloud service authentication information, and cloud resource authorization parameters to the cloud-network interoperability detection request and send it to the cloud-network interoperability detection module, and the cloud-network interoperability detection module obtains the access authentication information, Cloud network interoperability detection parameters are obtained from the cloud service authentication information and cloud resource authorization information.
  • the cloud-network interoperability detection module may respond to the received cloud-network interoperability detection request and generate cloud-network interoperability detection parameters based on the historical detection records of the previous detection cycle.
  • the cloud-network interoperability detection module may, in response to the received cloud-network interoperability detection request, obtain the cloud-network interoperability detection parameters from an external system that manages and maintains the user's cloud interoperability detection parameters or through external API configuration.
  • the authentication server or cloud-network interoperability detection module when the above-mentioned authentication server or cloud-network interoperability detection module obtains the cloud-network interoperability detection parameters from the access authentication information, cloud service authentication information, and cloud resource authorization parameters, the authentication server or cloud-network interoperability detection module can obtain the cloud-network interoperability detection parameters from the access authentication information.
  • the source parameters such as the IP address of the access gateway
  • obtain the destination detection parameters from the cloud resource authorization parameters such as the IP address of the cloud resource pool access end.
  • the authentication server realizes cloud network interoperability detection through interaction with the cloud network interoperability detection module, which can ensure the availability of cloud resources and thereby improve the user's cloud resource access experience.
  • the cloud-network interoperability detection module after receiving the cloud-network interoperability detection request, the cloud-network interoperability detection module initializes the detection record of the user terminal; determines the cloud-network interoperability detection strategy according to the cloud-network interoperability detection parameters; and downloads the download to the access gateway. Send the parameter information of the cloud resource pool access end and the cloud network interoperability detection strategy, so that the access gateway initiates the cloud network interoperability detection to the cloud resource pool access end based on the cloud network interoperability detection strategy, and returns the cloud network interoperability detection to the cloud network interoperability detection module result.
  • the cloud network interoperability detection module realizes interoperability detection between the access gateway and the cloud resource pool access end through interaction with the access gateway. By detecting and maintaining the interoperability between the access gateway and the cloud resource pool access end, Network connectivity between cloud resources ensures that authorized cloud resource services can be accessed by user terminals.
  • the cloud-network interoperability detection module can also determine the cloud-network interoperability detection strategy of the user terminal based on this cache; the cloud-network interoperability detection module can also configure the cloud-network interoperability detection strategy of the user terminal from an external device through the external API port.
  • the cloud network interoperability detection result corresponding to the user terminal returned by the cloud network interoperability detection module is received, and the cloud network interoperability detection result corresponding to the user terminal is returned to the access gateway, so that the access gateway
  • the ingress gateway is configured based on the cloud network interoperability detection results.
  • the authentication server can feedback the cloud-network interoperability detection results to the access gateway to prompt the access gateway that the user terminal that has been authenticated and authorized can access the cloud resource pool access terminal.
  • the authentication server can receive Input authentication results, access authorization parameters, cloud service authentication results and cloud resource authorization parameters, generate authorization information, and return the authorization information to the access gateway.
  • the authorization information can be defined according to the TLV (Tag, length, value, attribute type, length, value) format.
  • the attribute type can be used to describe the type of authorization information returned by the authentication server to the access gateway, which can include but is not limited to the following types: user identity identifier, access service identifier, access user's IP address, cloud service identifier, cloud resource Authorization parameters (such as vCPU, memory, disk size), cloud network interoperability detection parameters (encapsulation type, access gateway IP address, cloud resource pool access end address, etc.), cloud network interoperability detection results, etc.
  • Length can be used to describe the length of the attribute value corresponding to the corresponding attribute type. Values can be used to describe the attribute value corresponding to the corresponding attribute type.
  • the transmission protocol used may include but is not limited to the Radius (Remote Authentication Dial-In User Server, Remote Authentication Dial-In User Service) protocol.
  • an interaction example diagram of user authentication and authorization is also provided, as shown in Figure 6 .
  • the authentication server may perform step S601: in response to receiving the authentication request sent by the access gateway, perform access authentication of the user terminal; initiate a cloud service authentication request to the cloud service authentication module; initiate cloud network interoperability detection to the cloud network interoperability detection module ask;
  • the cloud service authentication module can perform step S602: obtain cloud service authentication parameters based on the cloud service authentication request, perform cloud service authentication of the user terminal according to the cloud service authentication parameters, and return the cloud service authentication results and cloud resource authorization parameters to the authentication server;
  • the cloud-network interoperability detection module can perform step S603: obtain cloud-network interoperability detection parameters based on the cloud-network interoperability detection request, perform cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection parameters, and return the cloud-network interoperability detection results to the authentication server;
  • the authentication server may perform step S604: determine the authorization information based on the access authentication results, access authorization parameters, cloud service authentication results, cloud resource authorization parameters and cloud network interoperability detection results, and return the authorization information to the access gateway to enable access The gateway completes local configuration.
  • the authentication server completes the access authentication, cloud service authentication, and cloud-network interoperability detection, and carries the access authorization parameters, cloud resource authorization parameters, and cloud-network interoperability detection results in the authorization information returned by the authentication server.
  • open up the authentication process of access business and cloud business and the access gateway completes the configuration according to the authorization information, which can simplify the user's business use process, enhance the convenience and security of users' use of cloud business, and thus catalyze the rapid and healthy development of cloud network business .
  • Exemplary embodiments of the present disclosure also provide a user authentication and authorization processing device, which is applied to network access and cloud service authentication and cloud resource authorization.
  • the user authentication and authorization processing device 700 may include:
  • the access authentication module 710 is configured to perform access authentication of the user terminal in response to receiving an authentication request sent by the access gateway, where the authentication request is generated by the user terminal and sent to the access gateway;
  • the cloud service authentication initiation module 720 is configured to initiate a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request;
  • the cloud-network interoperability detection initiating module 730 is configured to initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection request.
  • the cloud service authentication initiation module 720 may be configured to: send a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module obtains the cloud service authentication parameters based on the cloud service authentication request, And perform cloud service authentication of the user terminal according to the cloud service authentication parameters.
  • the cloud service authentication module can initialize the cloud service authentication information corresponding to the user terminal, and complete the cloud service authentication of the user terminal based on the cloud service authentication information to obtain the cloud service authentication request. Resource authorization parameters, and returns the cloud service authentication results and cloud resource authorization parameters to the authentication server.
  • the cloud-network interoperability detection initiating module 730 may be configured to: initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module obtains data based on the cloud-network interoperability detection request.
  • Cloud network interoperability detection parameters, and cloud network interoperability detection of user terminals is performed based on the cloud network interoperability detection parameters.
  • the cloud-network interoperability detection module after receiving the cloud-network interoperability detection request, the cloud-network interoperability detection module initializes the detection record of the user terminal, determines the cloud-network interoperability detection strategy according to the cloud-network interoperability detection parameters, and reports to the access
  • the gateway delivers the parameter information of the cloud resource pool access end and the cloud network interoperability detection policy, so that the access gateway initiates cloud network interoperability detection to the cloud resource pool access end based on the cloud network interoperability detection policy, and returns the cloud network interoperability detection module to the cloud network interoperability detection module.
  • Exchange test results
  • the user authentication and authorization processing device 700 may also include: an access authentication feedback module, configured to obtain the access authentication result corresponding to the user terminal and The access authorization parameters are returned to the access gateway, so that the access gateway can configure based on the access authentication results and the access authorization parameters.
  • the user authentication and authorization processing device 700 may also include: a cloud service authentication feedback module, and the cloud service authentication feedback module may be configured to: receive cloud service authentication.
  • the service authentication module returns the cloud service authentication result and cloud resource authorization parameters corresponding to the user terminal; returns the cloud service authentication result and cloud resource authorization parameters corresponding to the user terminal to the access gateway, so that the access gateway can authenticate according to the cloud service Configure the results and cloud resource authorization parameters.
  • the user authentication and authorization processing device 700 may also include: an interoperability detection feedback module, configured to receive the cloud-network interoperability detection result corresponding to the user terminal returned by the cloud-network interoperability detection module, and The cloud network interoperability detection result corresponding to the user terminal is returned to the access gateway, so that the access gateway performs configuration according to the cloud network interoperability detection result.
  • an interoperability detection feedback module configured to receive the cloud-network interoperability detection result corresponding to the user terminal returned by the cloud-network interoperability detection module, and The cloud network interoperability detection result corresponding to the user terminal is returned to the access gateway, so that the access gateway performs configuration according to the cloud network interoperability detection result.
  • Exemplary embodiments of the present disclosure also provide a computer-readable storage medium on which a program product capable of implementing the user authentication and authorization processing method described above in this specification is stored.
  • various aspects of the present disclosure can also be implemented in the form of a program product, which includes program code.
  • the program product When the program product is run on an electronic device, the program code is used to cause the electronic device to execute the above-mentioned instructions in this specification.
  • the steps according to various exemplary embodiments of the present disclosure are described in the "Exemplary Methods" section.
  • the program product may take the form of a portable compact disk read-only memory (CD-ROM) and include the program code, and may be run on an electronic device, such as a personal computer.
  • CD-ROM portable compact disk read-only memory
  • the program product of the present disclosure is not limited thereto.
  • a readable storage medium may be any tangible medium containing or storing a program that may be used by or in conjunction with an instruction execution system, apparatus, or device.
  • the Program Product may take the form of one or more readable media in any combination.
  • the readable medium may be a readable signal medium or a readable storage medium.
  • the readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device or device, or any combination thereof. More specific examples (non-exhaustive list) of readable storage media include: electrical connection with one or more conductors, portable disk, hard disk, random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave carrying readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above.
  • a readable signal medium may also be any readable medium other than a readable storage medium that can send, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a readable medium may be transmitted using any suitable medium, including but not limited to wireless, wireline, optical cable, RF, etc., or any suitable combination of the foregoing.
  • Program code for performing the operations of the present disclosure may be written in any combination of one or more programming languages, including object-oriented programming languages such as Java, C++, etc., as well as conventional procedural programming. Language—such as "C” or a similar programming language.
  • the program code may execute entirely on the user's computing device, partly on the target user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or executed on the server.
  • the remote computing device may be connected to the user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device, such as provided by an Internet service. (business comes via Internet connection).
  • LAN local area network
  • WAN wide area network
  • Exemplary embodiments of the present disclosure also provide an electronic device capable of implementing the above user authentication and authorization processing method.
  • An electronic device 800 according to such an exemplary embodiment of the present disclosure is described below with reference to FIG. 8 .
  • the electronic device 800 shown in FIG. 8 is only an example and should not bring any limitations to the functions and usage scope of the embodiments of the present disclosure.
  • electronic device 800 may take the form of a general-purpose computing device.
  • the components of the electronic device 800 may include, but are not limited to: at least one processing unit 810, at least one storage unit 820, a bus 830 connecting different system components (including the storage unit 820 and the processing unit 810), and a display unit 840.
  • the storage unit 820 stores program code, which can be executed by the processing unit 810, so that the processing unit 810 performs the steps according to various exemplary embodiments of the present disclosure described in the "Example Method" section of this specification to ensure cloud resources. availability and improve users’ convenience in using cloud services.
  • processing unit 810 can perform the following steps:
  • the above-mentioned initiating a cloud service authentication request to the cloud service authentication module may include the following steps: Authentication to the cloud service The module sends a cloud service authentication request, so that the cloud service authentication module obtains cloud service authentication parameters based on the cloud service authentication request, and performs cloud service authentication of the user terminal based on the cloud service authentication parameters.
  • the cloud service authentication module can initialize the cloud service authentication information corresponding to the user terminal, and complete the cloud service authentication of the user terminal based on the cloud service authentication information to obtain the cloud service authentication request. Resource authorization parameters, and returns the cloud service authentication results and cloud resource authorization parameters to the authentication server.
  • the above-mentioned initiating a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection of the user terminal based on the cloud-network interoperability detection request may include the following steps : Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module obtains the cloud-network interoperability detection parameters based on the cloud-network interoperability detection request, and performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection parameters.
  • the cloud-network interoperability detection module can initialize the detection record of the user terminal, determine the cloud-network interoperability detection strategy according to the cloud-network interoperability detection parameters, and provide the The ingress gateway delivers the parameter information of the cloud resource pool access end and the cloud network interoperability detection policy, so that the access gateway initiates cloud network interoperability detection to the cloud resource pool access end based on the cloud network interoperability detection policy, and returns the cloud network interoperability detection strategy to the cloud network interoperability detection module. Network interoperability test results.
  • the following steps may also be performed: returning the access authentication result and access authorization parameters corresponding to the user terminal to the access gateway, so that the access The gateway is configured based on the access authentication results and access authorization parameters.
  • the following steps may also be performed: receiving the cloud service authentication result and cloud resource authorization parameters corresponding to the user terminal returned by the cloud service authentication module; The corresponding cloud service authentication result and cloud resource authorization parameters are returned to the access gateway, so that the access gateway performs configuration according to the cloud service authentication result and cloud resource authorization parameters.
  • the following steps may also be performed: receiving the cloud-network interoperability detection result corresponding to the user terminal returned by the cloud-network interoperability detection module, and returning the cloud-network interoperability detection result corresponding to the user terminal to the interface.
  • Ingress gateway so that the access gateway can be configured based on the cloud network interoperability detection results.
  • the storage unit 820 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 821 and/or a cache storage unit 822, and may further include a read-only storage unit (ROM) 823.
  • RAM random access storage unit
  • ROM read-only storage unit
  • Storage unit 820 may also include a program/utility 824 having a set of (at least one) program modules 825 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, Each of these examples, or some combination, may include the implementation of a network environment.
  • program/utility 824 having a set of (at least one) program modules 825 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, Each of these examples, or some combination, may include the implementation of a network environment.
  • Bus 830 may be a local area representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or using any of a variety of bus structures. bus.
  • Electronic device 800 may also communicate with one or more external devices 900 (e.g., keyboard, pointing device, Bluetooth device, etc.), may also communicate with one or more devices that enable a user to interact with electronic device 800, and/or with Any device that enables the electronic device 800 to communicate with one or more other computing devices (eg, router, modem, etc.). This communication may occur through input/output (I/O) interface 850.
  • the electronic device 800 may also communicate with one or more networks (eg, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through a network adapter 860. As shown, network adapter 860 communicates with other modules of electronic device 800 via bus 830.
  • network adapter 860 communicates with other modules of electronic device 800 via bus 830.
  • electronic device 800 may be used in conjunction with electronic device 800, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives And data backup storage system, etc.
  • the example embodiments described here can be implemented by software, or can be implemented by software combined with necessary hardware. Therefore, the technical solution according to the embodiment of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , including several instructions to cause a computing device (which may be a personal computer, a server, a terminal device, a network device, etc.) to execute a method according to an exemplary embodiment of the present disclosure.
  • a computing device which may be a personal computer, a server, a terminal device, a network device, etc.
  • modules or units of equipment for action execution are mentioned in the above detailed description, this division is not mandatory.
  • the features and functions of two or more modules or units described above may be embodied in one module or unit.
  • the features and functions of one module or unit described above may be further divided into being embodied by multiple modules or units.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A user authentication and authorization method and apparatus, and a medium and an electronic device. The method comprises: in response to receiving an authentication request, which is sent by an access gateway, performing access authentication of a user terminal, wherein the authentication request is generated by the user terminal and is sent to the access gateway; initiating a cloud service authentication request to a cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal on the basis of the cloud service authentication request; and initiating a cloud network intercommunication detection request to a cloud network intercommunication detection module, so that the cloud network intercommunication detection module performs cloud network intercommunication detection of the user terminal on the basis of the cloud network intercommunication detection request. The collaboration of an access authentication function, a cloud service authentication function and a cloud network intercommunication detection function is realized, such that the availability of cloud resources can be ensured, and the convenience of a user using the cloud service can be improved.

Description

用户认证授权方法、装置、介质及设备User authentication and authorization methods, devices, media and equipment

相关申请的交叉引用Cross-references to related applications

本公开要求于2022年06月24日提交的申请号为202210730355.0、名称为“用户认证授权方法、装置、介质及设备”的中国专利申请的优先权,该中国专利申请的全部内容通过引用结合在本公开中。This disclosure claims priority to the Chinese patent application with application number 202210730355.0 and titled "User Authentication Authorization Method, Device, Medium and Equipment" submitted on June 24, 2022. The entire content of this Chinese patent application is incorporated by reference in This disclosure is ongoing.

技术领域Technical field

本公开涉及通信技术领域和云计算领域,尤其涉及一种用户认证授权方法、用户认证授权装置、计算机可读存储介质及电子设备。The present disclosure relates to the field of communication technology and the field of cloud computing, and in particular to a user authentication and authorization method, a user authentication and authorization device, a computer-readable storage medium and an electronic device.

背景技术Background technique

在云网融合场景下,大量用户既有接入业务需求又有云业务需求,对用户终端进行认证授权是用户终端使用接入业务或云业务过程中不可或缺的重要环节。In cloud-network integration scenarios, a large number of users have both access and cloud service needs. Authentication and authorization of user terminals is an indispensable and important link in the process of user terminals using access services or cloud services.

相关技术中,云业务认证和云资源授权独立于接入侧的认证服务流程。认证服务器返回的授权信息通常只与接入业务或数据通道相关,如IP(Internet Protocol,网际互连协议)分配、端口、MTU(Maximum Transmission Unit,最大传输单元)、PPP(Point to Point Protocol,点对点协议)等,不涉及到云资源申请与开通、云业务开通等服务,接入认证、云业务认证两个流程之间缺乏协同,使得用户云业务使用不便且云资源可用性无法保证。In related technologies, cloud service authentication and cloud resource authorization are independent of the authentication service process on the access side. The authorization information returned by the authentication server is usually only related to the access service or data channel, such as IP (Internet Protocol) allocation, port, MTU (Maximum Transmission Unit, maximum transmission unit), PPP (Point to Point Protocol, Point-to-point protocols), etc., do not involve cloud resource application and activation, cloud service activation and other services. The lack of coordination between the two processes of access authentication and cloud service authentication makes it inconvenient for users to use cloud services and the availability of cloud resources cannot be guaranteed.

需要说明的是,在上述背景技术部分公开的信息仅用于加强对本公开的背景的理解,因此可以包括不构成对本领域普通技术人员已知的现有技术的信息。It should be noted that the information disclosed in the above background section is only used to enhance understanding of the background of the present disclosure, and therefore may include information that does not constitute prior art known to those of ordinary skill in the art.

发明内容Contents of the invention

本公开的其他特性和优点将通过下面的详细描述变得显然,或部分地通过本公开的实践而习得。Additional features and advantages of the disclosure will be apparent from the following detailed description, or, in part, may be learned by practice of the disclosure.

根据本公开的第一方面,提供一种用户认证授权处理方法,应用于网络接入和云业务认证及云资源授权,所述方法包括:响应于接收到由接入网关发送的认证请求,进行用户终端的接入认证,其中所述认证请求由所述用户终端生成并发送至所述接入网关;向云业务认证模块发起云业务认证请求,以使所述云业务认证模块基于所述云业务认证请求进行所述用户终端的云业务认证;向云网互通检测模块发起云网互通检测请求,以使所述云网互通检测模块基于所述云网互通检测请求进行所述用户终端的云网互通检测。According to a first aspect of the present disclosure, a user authentication and authorization processing method is provided, which is applied to network access and cloud service authentication and cloud resource authorization. The method includes: in response to receiving an authentication request sent by an access gateway, performing Access authentication of the user terminal, wherein the authentication request is generated by the user terminal and sent to the access gateway; initiating a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module is based on the cloud service authentication module. The service authentication request performs cloud service authentication of the user terminal; and initiates a cloud network interoperability detection request to the cloud network interoperability detection module, so that the cloud network interoperability detection module performs cloud network interoperability detection request of the user terminal based on the cloud network interoperability detection request. Network interoperability detection.

在一种可选的实施方式中,所述向云业务认证模块发起云业务认证请求,以使所述云业务认证模块基于所述云业务认证请求进行所述用户终端的云业务认证,包括:向云业务认证模块发送云业务认证请求,以使所述云业务认证模块基于所述云业务认证请求获得云业务认证信息,并根据所述云业务认证信息进行所述用户终端的云业务认证。In an optional implementation, initiating a cloud service authentication request to the cloud service authentication module so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request includes: Send a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module obtains cloud service authentication information based on the cloud service authentication request, and performs cloud service authentication of the user terminal based on the cloud service authentication information.

在一种可选的实施方式中,所述云业务认证模块在接收到所述云业务认证请求后,初始化所述用户终端对应的云业务认证信息,并根据所述云业务认证信息完成所述用户终端的云业务认证,获得云资源授权参数,并向所述认证服务器返回云业务认证结果以及所述云资源授权参数。In an optional implementation, after receiving the cloud service authentication request, the cloud service authentication module initializes the cloud service authentication information corresponding to the user terminal, and completes the cloud service authentication information based on the cloud service authentication information. Cloud service authentication of the user terminal obtains cloud resource authorization parameters, and returns the cloud service authentication result and the cloud resource authorization parameters to the authentication server.

在一种可选的实施方式中,所述向云网互通检测模块发起云网互通检测请求,以使所述云网互通检测模块基于所述云网互通检测请求进行所述用户终端的云网互通检测,包括:向云网互通检测模块发起云网互通检测请求,以使所述云网互通检测模块基于所述云网互通检测请求获得云网互通检测参数,并根据所述云网互通检测参数进行所述用户终端的云网互通检测。In an optional implementation manner, the cloud network interoperability detection request is initiated to the cloud network interoperability detection module, so that the cloud network interoperability detection module performs cloud network interoperability detection on the user terminal based on the cloud network interoperability detection request. Interoperability detection includes: initiating a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module obtains cloud-network interoperability detection parameters based on the cloud-network interoperability detection request, and detects cloud-network interoperability based on the cloud-network interoperability detection module. Parameters are used to detect cloud-network interoperability of the user terminal.

在一种可选的实施方式中,所述云网互通检测模块在接收到所述云网互通检测请求后,初始化所述用户终端的检测记录,并根据所述云网互通检测参数确定云网互通检测策略,并向所述接入网关下发云资源池访问端的参数信息以及所述云网互通检测策略,以使所述接入网关基于所述云网互通检测策略向所述云资源池访问端发起云网互通检测,并向所述云网互通检测模块返回云网互通检测结果。In an optional implementation, after receiving the cloud network interoperability detection request, the cloud network interoperability detection module initializes the detection record of the user terminal, and determines the cloud network interoperability detection parameter according to the cloud network interoperability detection parameter. Interoperability detection strategy, and deliver the parameter information of the cloud resource pool access end and the cloud network interoperability detection strategy to the access gateway, so that the access gateway provides the cloud resource pool with an interoperability detection strategy based on the cloud network interoperability detection strategy. The access terminal initiates cloud-network interoperability detection and returns the cloud-network interoperability detection result to the cloud-network interoperability detection module.

在一种可选的实施方式中,若所述用户终端的接入认证通过,所述方法还包括:将所述用户终端所对应的接入认证结果以及接入授权参数返回给所述接入网关,以使所述接入网关根据所述接入认证结果以及所述接入授权参数进行配置。In an optional implementation, if the access authentication of the user terminal passes, the method further includes: returning the access authentication result and access authorization parameter corresponding to the user terminal to the access Gateway, so that the access gateway configures according to the access authentication result and the access authorization parameter.

在一种可选的实施方式中,若所述用户终端的云业务认证通过,所述方法还包括:接收所述云业务认证模块返回的所述用户终端所对应的云业务认证结果以及云资源授权参数;将所述用户终端所对应的所述云业务认证结果以及所述云资源授权参数返回给所述接入网关,以使所述接入网关根据所述云业务认证结果以及所述云资源授权参数进行配置。In an optional implementation, if the cloud service authentication of the user terminal passes, the method further includes: receiving the cloud service authentication result and cloud resources corresponding to the user terminal returned by the cloud service authentication module. Authorization parameters: Return the cloud service authentication result and the cloud resource authorization parameter corresponding to the user terminal to the access gateway, so that the access gateway Configure resource authorization parameters.

在一种可选的实施方式中,所述方法还包括:接收所述云网互通检测模块返回的所述用户终端所对应的云网互通检测结果,并将所述用户终端所对应的云网互通检测结果返回给所述接入网关,以使所述接入网关根据所述云网互通检测结果进行配置。In an optional implementation, the method further includes: receiving the cloud network interoperability detection result corresponding to the user terminal returned by the cloud network interoperability detection module, and converting the cloud network interoperability detection result corresponding to the user terminal into The interoperability detection result is returned to the access gateway, so that the access gateway configures according to the cloud network interoperability detection result.

根据本公开的第二方面,提供一种用户认证授权处理装置,应用于网络接入和云业务认证及云资源授权,所述装置包括:接入认证模块,用于响应于接收到由接入网关发送的认证请求,进行用户终端的接入认证,其中所述认证请求由所述用户终端生成并发送至所述接入网关;云业务认证发起模块,用于向云业务认证模块发起云业务认证请求,以使所述云业务认证模块基于所述云业务认证请求进行所述用户终端的云业务认证;云网互通检测发起模块,用于向云网互通检测模块发起云网互通检测请求,以使所述云网互通检测模块基于所述云网互通检测请求进行所述用户终端的云网互通检测。According to a second aspect of the present disclosure, a user authentication and authorization processing device is provided, which is applied to network access and cloud service authentication and cloud resource authorization. The device includes: an access authentication module, configured to respond to receiving the The authentication request sent by the gateway performs access authentication of the user terminal, where the authentication request is generated by the user terminal and sent to the access gateway; a cloud service authentication initiation module is used to initiate cloud services to the cloud service authentication module Authentication request, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request; a cloud network interoperability detection initiation module, used to initiate a cloud network interoperability detection request to the cloud network interoperability detection module, So that the cloud network interoperability detection module performs cloud network interoperability detection of the user terminal based on the cloud network interoperability detection request.

根据本公开的第三方面,提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述用户认证授权处理方法。According to a third aspect of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored. When the computer program is executed by a processor, the above-mentioned user authentication and authorization processing method is implemented.

根据本公开的第四方面,提供一种电子设备,包括:处理器;以及存储器,用于存储所述处理器的可执行指令;其中,所述处理器配置为经由执行所述可执行指令来执行上述 用户认证授权处理方法。According to a fourth aspect of the present disclosure, an electronic device is provided, including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the operation via executing the executable instructions. Execute the above user authentication and authorization processing method.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It should be understood that the foregoing general description and the following detailed description are exemplary and explanatory only, and do not limit the present disclosure.

附图说明Description of the drawings

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施方式,并与说明书一起用于解释本公开的原理。显而易见地,下面描述中的附图仅仅是本公开的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. Obviously, the drawings in the following description are only some embodiments of the present disclosure. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without exerting creative efforts.

图1示出本示例性实施方式中一种用户认证授权处理方法所运行的系统架构;Figure 1 shows the system architecture executed by a user authentication and authorization processing method in this exemplary embodiment;

图2示出本示例性实施方式中一种用户认证授权处理方法的流程图;Figure 2 shows a flow chart of a user authentication and authorization processing method in this exemplary embodiment;

图3示出本示例性实施方式中一种由认证服务器执行的接入认证流程图;Figure 3 shows an access authentication flow chart executed by the authentication server in this exemplary embodiment;

图4示出本示例性实施方式中一种由云业务认证模块执行的云业务认证流程图;Figure 4 shows a cloud service authentication flow chart executed by the cloud service authentication module in this exemplary embodiment;

图5示出本示例性实施方式中一种由云网互通检测模块执行的云网互通检测结果反馈流程图;Figure 5 shows a flow chart of feedback of cloud-network interoperability detection results executed by the cloud-network interoperability detection module in this exemplary embodiment;

图6示出本示例性实施方式中一种用户认证授权的交互实例图;Figure 6 shows an interaction example diagram of user authentication and authorization in this exemplary embodiment;

图7示出本示例性实施方式中一种用户认证授权处理装置的结构框图;Figure 7 shows a structural block diagram of a user authentication and authorization processing device in this exemplary embodiment;

图8示出本示例性实施方式中一种用于实现上述用户认证授权处理方法的电子设备。FIG. 8 shows an electronic device used to implement the above user authentication and authorization processing method in this exemplary embodiment.

具体实施方式Detailed ways

现在将参考附图更全面地描述示例实施方式。然而,示例实施方式能够以多种形式实施,且不应被理解为限于在此阐述的范例;相反,提供这些实施方式使得本公开将更加全面和完整,并将示例实施方式的构思全面地传达给本领域的技术人员。所描述的特征、结构或特性可以以任何合适的方式结合在一个或更多实施方式中。在下面的描述中,提供许多具体细节从而给出对本公开的实施方式的充分理解。然而,本领域技术人员将意识到,可以实践本公开的技术方案而省略所述特定细节中的一个或更多,或者可以采用其它的方法、组元、装置、步骤等。在其它情况下,不详细示出或描述公知技术方案以避免喧宾夺主而使得本公开的各方面变得模糊。Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in various forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concepts of the example embodiments. To those skilled in the art. The described features, structures or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details described, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the disclosure.

此外,附图仅为本公开的示意性图解,并非一定是按比例绘制。图中相同的附图标记表示相同或类似的部分,因而将省略对它们的重复描述。附图中所示的一些方框图是功能实体,不一定必须与物理或逻辑上独立的实体相对应。可以采用软件形式来实现这些功能实体,或在一个或多个硬件模块或集成电路中实现这些功能实体,或在不同网络和/或处理器装置和/或微控制器装置中实现这些功能实体。Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings represent the same or similar parts, and thus their repeated description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software form, or implemented in one or more hardware modules or integrated circuits, or implemented in different networks and/or processor devices and/or microcontroller devices.

相关技术中,接入认证和授权、云业务认证和授权采用独立流程,缺少协同,用户终端需要完成两次认证。这种方式可能存在以下问题:用户使用不便;认证信息碎片化,增 加了安全风险;云业务的认证通道与访问通道不保证一致,云业务认证授权不能够保证云业务是可用的;不利于实现接入服务商、云服务商的协同优势。In related technologies, access authentication and authorization, cloud service authentication and authorization adopt independent processes, lacking coordination, and user terminals need to complete authentication twice. This method may have the following problems: it is inconvenient for users; the authentication information is fragmented, which increases security risks; the authentication channel and access channel of the cloud business are not guaranteed to be consistent, and the cloud business authentication and authorization cannot guarantee that the cloud business is available; it is not conducive to implementation The synergistic advantages of access service providers and cloud service providers.

鉴于上述一个或多个问题,本公开的示例性实施方式提供一种用户认证授权处理方法。该用户认证授权处理方法可以应用于用户终端同时使用接入业务和云业务的场景。In view of one or more of the above problems, exemplary embodiments of the present disclosure provide a user authentication authorization processing method. This user authentication and authorization processing method can be applied to scenarios where user terminals use access services and cloud services at the same time.

具体的,该用户认证授权处理方法可部署于如图1所示的网络架构100中,由该网络架构100中的认证服务器110来执行。该网络架构100可以包括:认证服务器110、云业务认证模块120、云网互通检测模块130、接入网关140、用户终端150以及云资源池访问端160。Specifically, the user authentication and authorization processing method can be deployed in the network architecture 100 shown in Figure 1 and executed by the authentication server 110 in the network architecture 100. The network architecture 100 may include: an authentication server 110, a cloud service authentication module 120, a cloud network interoperability detection module 130, an access gateway 140, a user terminal 150, and a cloud resource pool access terminal 160.

其中,认证服务器110包括但不限于AAA服务器或5G网络的DN-AAA(Data Network-Authentication、Authorization、Accounting)服务器等类型,可以与云业务认证模块120、云网互通检测模块130以及接入网关140进行通信,能够接收接入网关140发送的认证请求,可以获取云业务认证模块120所返回的云业务认证结果以及云资源授权参数等数据,可以获取云网互通检测模块130所返回的接入网关与云资源的互通检测结果等数据,还可以向接入网关140返回授权信息等数据。云业务认证模块120可以负责云业务认证,生成并维护云资源授权参数。云网互通检测模块130可以负责检测和维护接入网关140与云资源池访问端160之间的网络连通性,并把检测结果返回认证服务器。接入网关140可以在用户终端150发起认证请求时,将认证请求发送至认证服务器110,并从认证服务器110获得接入授权参数、云资源授权参数、云网互通检测结果等信息,完成接入网关的本地配置。用户终端150可搭载于智能手机、电脑、智能监控、车载系统等可进行网络通信的智能设备上。云资源池访问端160可以提供云资源访问服务。Among them, the authentication server 110 includes but is not limited to AAA server or DN-AAA (Data Network-Authentication, Authorization, Accounting) server of the 5G network, etc., and can be connected with the cloud service authentication module 120, the cloud network interoperability detection module 130 and the access gateway. 140 communicates, can receive the authentication request sent by the access gateway 140, can obtain the cloud service authentication results and cloud resource authorization parameters and other data returned by the cloud service authentication module 120, and can obtain the access data returned by the cloud network interoperability detection module 130. Data such as interoperability detection results between the gateway and cloud resources can also be returned to the access gateway 140, such as authorization information. The cloud service authentication module 120 may be responsible for cloud service authentication, generating and maintaining cloud resource authorization parameters. The cloud network interoperability detection module 130 may be responsible for detecting and maintaining network connectivity between the access gateway 140 and the cloud resource pool access terminal 160, and returning the detection results to the authentication server. The access gateway 140 can send the authentication request to the authentication server 110 when the user terminal 150 initiates the authentication request, and obtain access authorization parameters, cloud resource authorization parameters, cloud network interoperability detection results and other information from the authentication server 110 to complete the access. The local configuration of the gateway. The user terminal 150 can be mounted on smart devices capable of network communication, such as smartphones, computers, smart monitoring systems, and vehicle-mounted systems. The cloud resource pool access terminal 160 can provide cloud resource access services.

图2示出了本示例性实施方式中一种用户认证授权处理方法的示意性流程,应用于网络接入和云业务认证及云资源授权,可以包括以下步骤S210至步骤S230:Figure 2 shows a schematic flow of a user authentication and authorization processing method in this exemplary embodiment. It is applied to network access and cloud service authentication and cloud resource authorization, and may include the following steps S210 to step S230:

步骤S210,响应于接收到由接入网关发送的认证请求,进行用户终端的接入认证,其中认证请求由用户终端生成并发送至接入网关;Step S210: In response to receiving the authentication request sent by the access gateway, perform access authentication of the user terminal, where the authentication request is generated by the user terminal and sent to the access gateway;

步骤S220,向云业务认证模块发起云业务认证请求,以使云业务认证模块基于云业务认证请求进行用户终端的云业务认证;Step S220: Initiate a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request;

步骤S230,向云网互通检测模块发起云网互通检测请求,以使云网互通检测模块基于云网互通检测请求进行用户终端的云网互通检测。Step S230: Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection request.

上述用户认证授权处理过程中,实现了接入认证、云业务认证以及云网互通检测间的协同。一方面,打通了接入业务与云业务的认证流程,在一定程度上简化用户业务使用流程,增强了用户使用云业务的便利性,且通过功能协同避免了认证信息碎片化所导致的安全问题,催化了云网业务的快速健康发展。另一方面,通过连通云网互通检测功能,进一步完善了用户认证授权机制,能够避免云业务的认证通道与访问通道不一致所导致的云资源无法访问的问题,进而确保云资源的可用性。During the above user authentication and authorization processing process, collaboration between access authentication, cloud service authentication, and cloud network interoperability detection is achieved. On the one hand, it unifies the authentication process of access business and cloud business, simplifies the user business use process to a certain extent, enhances the convenience for users to use cloud business, and avoids security issues caused by the fragmentation of authentication information through functional collaboration. , catalyzing the rapid and healthy development of cloud network business. On the other hand, through the cloud-network interoperability detection function, the user authentication and authorization mechanism is further improved, which can avoid the problem of inaccessibility of cloud resources caused by inconsistent authentication channels and access channels for cloud services, thereby ensuring the availability of cloud resources.

下面分别对图2中的每个步骤进行具体说明。Each step in Figure 2 is described in detail below.

步骤S210,响应于接收到由接入网关发送的认证请求,进行用户终端的接入认证,其中认证请求由用户终端生成并发送至接入网关。Step S210: In response to receiving the authentication request sent by the access gateway, perform access authentication of the user terminal, where the authentication request is generated by the user terminal and sent to the access gateway.

用户终端可以向接入网关发起认证,并由接入网关将该用户终端的认证请求发送给认证服务器,认证服务器在接收到接入网关发送的认证请求后,可对该用户终端进行接入认证。The user terminal can initiate authentication to the access gateway, and the access gateway sends the authentication request of the user terminal to the authentication server. After receiving the authentication request sent by the access gateway, the authentication server can perform access authentication on the user terminal. .

具体的,上述进行用户终端的接入认证,可以通过以下步骤来实现:将认证请求进行解析,得到接入认证信息;根据接入认证信息对用户终端进行接入认证。该接入认证信息包括但不限于用户名、用户账号等信息,具体可由认证服务器所配置的接入认证机制来决定,这里不做具体限定。Specifically, the above-mentioned access authentication of the user terminal can be implemented through the following steps: parsing the authentication request to obtain the access authentication information; performing access authentication on the user terminal based on the access authentication information. The access authentication information includes but is not limited to user name, user account and other information. The details can be determined by the access authentication mechanism configured by the authentication server, and are not specifically limited here.

接入认证完成后,认证服务器可以将接入认证结果返回给接入网关,以便接入网关向用户终端反馈本次接入认证结果。After the access authentication is completed, the authentication server can return the access authentication result to the access gateway, so that the access gateway can feed back the access authentication result to the user terminal.

在一种可选的实施方式中,若用户终端的接入认证通过,还可以执行以下步骤:将用户终端所对应的接入认证结果以及接入授权参数返回给接入网关,以使接入网关根据接入认证结果以及接入授权参数进行配置。In an optional implementation, if the access authentication of the user terminal passes, the following steps may also be performed: return the access authentication result and access authorization parameters corresponding to the user terminal to the access gateway, so that the access The gateway is configured based on the access authentication results and access authorization parameters.

在用户终端的接入认证通过时,认证服务器可通过向接入网关反馈接入认证通过信息以及接入授权参数,以便于接入网关针对用户终端进行接入授权参数的配置,使得用户终端可以正常使用接入业务。When the access authentication of the user terminal passes, the authentication server can feed back access authentication passing information and access authorization parameters to the access gateway, so that the access gateway can configure the access authorization parameters for the user terminal, so that the user terminal can Use access services normally.

若用户终端的接入认证未通过,则认证服务器可直接向接入网关返回接入认证未通过信息,并由接入网关向用户终端反馈接入认证未通过信息,以结束本次认证授权流程。If the access authentication of the user terminal fails, the authentication server can directly return access authentication failure information to the access gateway, and the access gateway feeds back the access authentication failure information to the user terminal to end this authentication and authorization process. .

示例性的,如图3所示,提供了一种由认证服务器执行的接入认证流程图,具体可以包括以下步骤:For example, as shown in Figure 3, an access authentication flow chart executed by an authentication server is provided, which may include the following steps:

步骤S301,接收到由接入网关发送的认证请求;Step S301: Receive the authentication request sent by the access gateway;

步骤S302,解析认证信息,得到接入认证信息;Step S302, parse the authentication information to obtain access authentication information;

步骤S303,根据接入认证信息,对用户终端进行接入认证;Step S303: Perform access authentication on the user terminal according to the access authentication information;

步骤S304,判断接入认证是否通过,若通过则执行步骤S305,若未通过则执行步骤S306;Step S304: Determine whether the access authentication passes. If it passes, execute step S305. If it fails, execute step S306;

步骤S305,向接入网关返回接入认证通过信息以及接入授权参数;Step S305: Return access authentication passing information and access authorization parameters to the access gateway;

步骤S306,向接入网关返回接入认证未通过信息。Step S306: Return access authentication failure information to the access gateway.

需要说明的是,认证服务器接入认证完成后,若接入认证通过,可以实时将接入认证结果以及接入授权参数返回接入网关,还可以等待步骤S220以及步骤S230执行完成后,将所需要返回给接入网关的信息一同进行返回,以减少通信次数。It should be noted that after the authentication server access authentication is completed, if the access authentication is passed, the access authentication result and access authorization parameters can be returned to the access gateway in real time. You can also wait for the execution of steps S220 and S230 to complete. The information that needs to be returned to the access gateway is returned together to reduce the number of communications.

认证服务器在完成接入认证后,可以判断该用户终端是否具有云业务,若否,则可直接向接入网关返回接入认证结果;若是,则可参考图2继续向下执行步骤S220。After completing the access authentication, the authentication server can determine whether the user terminal has cloud services. If not, it can directly return the access authentication result to the access gateway; if so, it can continue to step S220 with reference to Figure 2.

步骤S220,向云业务认证模块发起云业务认证请求,以使云业务认证模块基于云业务认证请求进行用户终端的云业务认证。Step S220: Initiate a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request.

认证服务器可以在确定用户终端具有云业务后,向云业务认证模块发起云业务认证请求。云业务认证模块在接收到云业务认证请求后,可以根据所接到的云业务认证请求对用户终端进行云业务认证。The authentication server may initiate a cloud service authentication request to the cloud service authentication module after determining that the user terminal has the cloud service. After receiving the cloud service authentication request, the cloud service authentication module can perform cloud service authentication on the user terminal according to the received cloud service authentication request.

在一种可选的实施方式中,上述向云业务认证模块发起云业务认证请求,以使云业务认证模块基于云业务认证请求进行用户终端的云业务认证,具体可通过以下步骤来实现:向云业务认证模块发送云业务认证请求,以使云业务认证模块基于云业务认证请求获得云业务认证信息,并根据云业务认证信息进行用户终端的云业务认证。In an optional implementation manner, the above-mentioned initiating a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request. Specifically, this can be achieved through the following steps: The cloud service authentication module sends a cloud service authentication request, so that the cloud service authentication module obtains cloud service authentication information based on the cloud service authentication request, and performs cloud service authentication of the user terminal based on the cloud service authentication information.

云业务认证信息可以包括但不限于用户名、密码、云业务标识、云业务域名、云业务IP地址等信息的一部分或全部。示例性的,认证服务器可以直接将用户终端所接入用户的用户名、密码作为云业务认证信息,具体可由云业务认证模块所配置的云业务认证机制来决定,这里不做具体限定。Cloud service authentication information may include, but is not limited to, part or all of user name, password, cloud service identifier, cloud service domain name, cloud service IP address and other information. For example, the authentication server can directly use the user name and password of the user connected to the user terminal as the cloud service authentication information. The details can be determined by the cloud service authentication mechanism configured in the cloud service authentication module, which is not specifically limited here.

示例性的,可由认证服务器根据接入信息生成云业务认证信息,将该云业务认证信息附加至云业务认证请求中,将该附加了云业务认证信息的云业务认证请求发送给云业务认证模块。云业务认证模块在接收到云业务认证请求后,可通过解析该云业务认证请求得到云业务认证信息,并根据云业务认证信息对用户终端进行云业务认证。其中,接入信息可以是接入用户的用户名、密码、会话标识、用户身份标识以及认证服务器完成用户接入认证后所获取到的信息等。For example, the authentication server can generate cloud service authentication information based on the access information, append the cloud service authentication information to the cloud service authentication request, and send the cloud service authentication request with the cloud service authentication information appended to the cloud service authentication module. . After receiving the cloud service authentication request, the cloud service authentication module can obtain the cloud service authentication information by parsing the cloud service authentication request, and perform cloud service authentication on the user terminal based on the cloud service authentication information. The access information may include the access user's user name, password, session ID, user identity, and information obtained by the authentication server after completing user access authentication.

示例性的,可由认证服务器将接入认证信息附加至云业务认证请求中,并将云业务认证请求发送给云业务认证模块。云业务认证模块通过解析云业务认证请求获得接入认证信息;根据接入认证信息生成云业务认证信息;根据云业务认证信息对用户终端进行云业务认证。For example, the authentication server may append the access authentication information to the cloud service authentication request, and send the cloud service authentication request to the cloud service authentication module. The cloud service authentication module obtains access authentication information by parsing the cloud service authentication request; generates cloud service authentication information based on the access authentication information; and performs cloud service authentication on the user terminal based on the cloud service authentication information.

示例性的,可由认证服务器将云业务认证请求发送给云业务认证模块。云业务认证模块可响应于所接收到的云业务认证请求,查询本地缓存,得到用户终端所接入用户的历史认证记录,并根据历史认证记录得到云业务认证信息;根据云业务认证信息对用户终端进行云业务认证。For example, the authentication server may send the cloud service authentication request to the cloud service authentication module. The cloud service authentication module can respond to the received cloud service authentication request, query the local cache, obtain the historical authentication record of the user accessed by the user terminal, and obtain the cloud service authentication information based on the historical authentication record; verify the user based on the cloud service authentication information The terminal performs cloud service authentication.

示例性的,可由认证服务器将云业务认证请求发送给云业务认证模块。云业务认证模块可响应于所接收到的云业务认证请求,从第三方模块或通过外部API(Application Programming Interface,应用程序编程接口)配置获得云业务认证信息;根据云业务认证信息对用户终端进行云业务认证。其中,第三方模块代表一种云业务认证信息的来源,比如用于管理和维护用户的云业务认证信息的外部系统。For example, the authentication server may send the cloud service authentication request to the cloud service authentication module. The cloud service authentication module can respond to the received cloud service authentication request, obtain cloud service authentication information from a third-party module or through external API (Application Programming Interface, application programming interface) configuration; perform authentication on the user terminal based on the cloud service authentication information Cloud business certification. Among them, the third-party module represents a source of cloud service authentication information, such as an external system used to manage and maintain users' cloud service authentication information.

上述过程中,认证服务器通过与云业务认证模块的交互,实现对用户终端的云业务认证,连通了接入认证服务与云业务认证服务,以便于简化用户认证授权的流程,进而提升用户认证授权的效率。In the above process, the authentication server realizes the cloud service authentication of the user terminal through interaction with the cloud service authentication module, connecting the access authentication service and the cloud service authentication service to simplify the user authentication and authorization process, thereby improving user authentication and authorization. s efficiency.

云业务认证模块在接收到云业务认证请求后,还可以初始化用户终端对应的云业务认证信息;根据云业务认证信息完成用户终端的云业务认证,获得云资源授权参数;向认证 服务器返回云业务认证结果以及云资源授权参数,以便于后续认证服务器向接入网关反馈本次云业务认证结果以及云资源授权参数。After receiving the cloud service authentication request, the cloud service authentication module can also initialize the cloud service authentication information corresponding to the user terminal; complete the cloud service authentication of the user terminal according to the cloud service authentication information, obtain the cloud resource authorization parameters; and return the cloud service to the authentication server. Authentication results and cloud resource authorization parameters, so that the subsequent authentication server can feed back the cloud service authentication results and cloud resource authorization parameters to the access gateway.

在一种可选的实施方式中,若用户终端的云业务认证通过,还可以执行以下步骤:接收云业务认证模块返回的用户终端所对应的云业务认证结果以及云资源授权参数;将用户终端所对应的云业务认证结果以及云资源授权参数返回给接入网关,以使接入网关根据云业务认证结果以及云资源授权参数进行配置。In an optional implementation, if the cloud service authentication of the user terminal passes, the following steps may also be performed: receiving the cloud service authentication result and cloud resource authorization parameters corresponding to the user terminal returned by the cloud service authentication module; The corresponding cloud service authentication result and cloud resource authorization parameters are returned to the access gateway, so that the access gateway performs configuration according to the cloud service authentication result and cloud resource authorization parameters.

在用户终端的云业务认证通过时,云业务认证模块可将云业务认证通过信息以及云资源授权参数返回给认证服务器,并通过认证服务器向接入网关反馈云业务认证通过信息以及云资源授权参数,以便于接入网关针对用户终端进行云资源授权参数的配置,使得用户终端可以正常使用云业务。When the cloud service authentication of the user terminal passes, the cloud service authentication module can return the cloud service authentication passing information and cloud resource authorization parameters to the authentication server, and feed back the cloud service authentication passing information and cloud resource authorization parameters to the access gateway through the authentication server. , so that the access gateway can configure the cloud resource authorization parameters for the user terminal, so that the user terminal can use cloud services normally.

云业务认证模块向认证服务器所返回的信息还可以包括但不限于:云业务标识、云业务域名等信息中的部分或全部。The information returned by the cloud service authentication module to the authentication server may also include but is not limited to: some or all of the cloud service identifier, cloud service domain name and other information.

云资源授权参数可以包括但不限于以下信息中的部分或全部:Cloud resource authorization parameters may include but are not limited to some or all of the following information:

(1)云资源池访问端的域名、IP地址;(1) The domain name and IP address of the cloud resource pool access terminal;

(2)资源类型(如虚拟机、容器/pod、物理机)、vCPU(Virtual Central Processing Unit,虚拟处理器)、内存、存储等参数。其中pod可以看作是容器的集合。(2) Resource type (such as virtual machine, container/pod, physical machine), vCPU (Virtual Central Processing Unit, virtual processor), memory, storage and other parameters. A pod can be viewed as a collection of containers.

若用户终端的云业务认证未通过,则云业务认证模块可直接向认证服务器返回云业务认证未通过信息,并由认证服务器通过接入网关向用户终端返回云业务认证未通过信息,以结束本次认证授权流程。If the cloud service authentication of the user terminal fails, the cloud service authentication module can directly return the cloud service authentication failed information to the authentication server, and the authentication server returns the cloud service authentication failed information to the user terminal through the access gateway to end this section. Sub-authentication and authorization process.

示例性的,如图4所示,提供了一种由云业务认证模块执行的云业务认证流程图,具体可以包括以下步骤:As an example, as shown in Figure 4, a cloud service authentication flow chart executed by the cloud service authentication module is provided, which may include the following steps:

步骤S401,响应于所接收到的云业务认证请求,进行云业务认证;Step S401: In response to the received cloud service authentication request, perform cloud service authentication;

步骤S402,获得云业务认证结果以及云资源授权参数;Step S402, obtain cloud service authentication results and cloud resource authorization parameters;

步骤S403,判断云业务认证结果是否通过,若通过则执行步骤S404,若未通过则执行步骤S405;Step S403: Determine whether the cloud service authentication result passes. If it passes, execute step S404. If it fails, execute step S405;

步骤S404,向认证服务器返回云业务认证通过信息以及云资源授权参数;Step S404: Return cloud service authentication passing information and cloud resource authorization parameters to the authentication server;

步骤S405,向认证服务器返回云业务认证未通过信息。Step S405: Return cloud service authentication failure information to the authentication server.

需要说明的是,认证服务器在云任务认证完成后,若云业务认证通过,可以实时将云业务认证结果以及云资源授权参数返回接入网关,还可以等待步骤S230执行完成后,将所需要返回给接入网关的信息一同进行返回,以减少通信次数。It should be noted that after the cloud task authentication is completed, the authentication server can return the cloud service authentication results and cloud resource authorization parameters to the access gateway in real time if the cloud service authentication passes. It can also wait for the completion of step S230 and return the required information. The information to the access gateway is returned together to reduce the number of communications.

云业务认证完成后,可继续参考图2,执行步骤S230,进行云网互通检测。After the cloud service authentication is completed, you can continue to refer to Figure 2 and perform step S230 to perform cloud network interoperability detection.

步骤S230,向云网互通检测模块发起云网互通检测请求,以使云网互通检测模块基于云网互通检测请求进行用户终端的云网互通检测。Step S230: Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection request.

认证服务器可向云网互通检测模块发送云网互通检测请求。云网互通检测模块在接收到云网互通检测请求后,可以根据云网互通检测请求对用户终端进行云网互通检测。The authentication server can send a cloud-network interoperability detection request to the cloud-network interoperability detection module. After receiving the cloud network interoperability detection request, the cloud network interoperability detection module can perform cloud network interoperability detection on the user terminal according to the cloud network interoperability detection request.

在一种可选的实施方式中,上述向云网互通检测模块发起云网互通检测请求,以使云网互通检测模块基于云网互通检测请求进行用户终端的云网互通检测,可以通过以下方式来实现:向云网互通检测模块发起云网互通检测请求,以使云网互通检测模块基于云网互通检测请求获得云网互通检测参数,并根据云网互通检测参数进行用户终端的云网互通检测。In an optional implementation, the above-mentioned method of initiating a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection of the user terminal based on the cloud-network interoperability detection request, can be done in the following manner To achieve: Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module obtains the cloud-network interoperability detection parameters based on the cloud-network interoperability detection request, and performs cloud-network interoperability of the user terminal based on the cloud-network interoperability detection parameters. detection.

云网互通检测请求所携带的参数可以包括但不限于:用户身份标识、接入网关参数(如IP地址等)、云业务标识、云业务域名、云业务IP地址、云资源授权参数等信息中的部分或全部,具体可由云网互通检测模块所配置的云网互通检测机制来决定,这里不做具体限定。The parameters carried by the cloud network interoperability detection request may include but are not limited to: user identity, access gateway parameters (such as IP address, etc.), cloud service identifier, cloud service domain name, cloud service IP address, cloud resource authorization parameters and other information Part or all of it can be determined by the cloud-network interoperability detection mechanism configured in the cloud-network interoperability detection module, and there is no specific limit here.

示例性的,如图5所示,提供了一种由云网互通检测模块执行的云网互通检测结果反馈流程图,可以包括以下步骤:As an example, as shown in Figure 5, a flow chart of feedback of cloud-network interoperability detection results executed by the cloud-network interoperability detection module is provided, which may include the following steps:

步骤S501,在接收到云网互通检测请求后,可通过解析云网互通检测请求,得到云网互通检测参数;Step S501: After receiving the cloud-network interoperability detection request, the cloud-network interoperability detection parameters can be obtained by parsing the cloud-network interoperability detection request;

步骤S502,判断是否满足预设检测周期,若否则继续执行步骤S503,若是则跳转至步骤S504;Step S502, determine whether the preset detection period is met, if not, continue to step S503, if so, jump to step S504;

步骤S503,查询本地所存储的上个检测周期的历史检测记录;Step S503, query the locally stored historical detection records of the previous detection cycle;

步骤S504,判断是否查询到历史检测记录,若否则继续执行步骤S505,若是则跳转至步骤S506;Step S504, determine whether the historical detection record is queried, if not, continue to step S505, if so, jump to step S506;

步骤S505,发起云网互通检测,接收云网互通检测结果,并更新检测记录;Step S505: Initiate cloud-network interoperability detection, receive cloud-network interoperability detection results, and update detection records;

步骤S506,返回云网互通检测结果。Step S506: Return the cloud network interoperability detection results.

历史检测记录包括但不限于如下参数:源端参数,目的端参数,检测方法,检测结果。其中,源端、目的端可分别指接入网关、云资源池访问端,源端参数可例如接入网关的IP地址,目的端参数可例如云资源池访问端的域名、IP地址;检测方法可以包括但不限于ping、HTTP(Hyper Text Transfer Protocol,超文本传输协议)访问等方式;检测结果包括但不限于检测过程中获得的单个或多个检测结果的平均值,如时延、丢包率等的平均值等。其中,ping可用于确定源端是否能与目的端成功交换(发送与接收)数据包,再根据返回的信息,推断TCP/IP参数是否设置正确,以及运行是否正常、网络是否通畅等。HTTP属于一种请求-响应协议,通常运行在TCP协议之上,可指定源端可能发送给目的端的消息以及得到的响应。Historical detection records include but are not limited to the following parameters: source parameters, destination parameters, detection methods, and detection results. Among them, the source end and the destination end can respectively refer to the access gateway and the cloud resource pool access end. The source end parameters can be, for example, the IP address of the access gateway, and the destination end parameters can be, for example, the domain name and IP address of the cloud resource pool access end; the detection method can be Including but not limited to ping, HTTP (Hyper Text Transfer Protocol, Hypertext Transfer Protocol) access, etc.; detection results include but are not limited to the average of single or multiple detection results obtained during the detection process, such as delay, packet loss rate average etc. Among them, ping can be used to determine whether the source end can successfully exchange (send and receive) data packets with the destination end, and then based on the returned information, infer whether the TCP/IP parameters are set correctly, whether the operation is normal, whether the network is smooth, etc. HTTP is a request-response protocol that usually runs on top of the TCP protocol and can specify the messages that the source end may send to the destination end and the response received.

需要说明的是,图5所示的步骤中通过设置检测周期,使得云网互通检测模块不用每次都进行云网互通检测,能够在一定程度上缩短返回云网互通检测结果的时间,进一步提高用户认证授权效率。在实际应用过程中,还可以在接收到云网互通检测请求后便进行云网互通检测,以获取到最新的检测结果。周期性检测和实时性检测这两种方式,可根据实际需求进行设定,这里不做具体限定。It should be noted that by setting the detection cycle in the steps shown in Figure 5, the cloud-network interoperability detection module does not need to perform cloud-network interoperability detection every time, which can shorten the time for returning cloud-network interoperability detection results to a certain extent and further improve User authentication and authorization efficiency. In the actual application process, the cloud-network interoperability detection can also be performed after receiving the cloud-network interoperability detection request to obtain the latest detection results. The two methods of periodic detection and real-time detection can be set according to actual needs, and there are no specific limitations here.

云网互通检测模块可通过以下任意一种方式得到云网互通检测参数,这里不做具体限 定。The cloud-network interoperability detection module can obtain the cloud-network interoperability detection parameters through any of the following methods, which are not specifically limited here.

示例性的,可由认证服务器从接入认证信息、云业务认证信息、云资源授权参数中获取云网互通检测参数,并将云网互通检测参数附加至云网互通检测请求中发送给云网互通检测模块。云网互通检测模块可以通过解析云网互通检测请求得到云网互通检测参数。For example, the authentication server can obtain the cloud-network interoperability detection parameters from the access authentication information, cloud service authentication information, and cloud resource authorization parameters, and append the cloud-network interoperability detection parameters to the cloud-network interoperability detection request and send it to the cloud-network interoperability detection module. The cloud-network interoperability detection module can obtain the cloud-network interoperability detection parameters by parsing the cloud-network interoperability detection request.

示例性的,可由认证服务器将接入认证信息、云业务认证信息、云资源授权参数附加至云网互通检测请求中发送给云网互通检测模块,由云网互通检测模块从接入认证信息、云业务认证信息、云资源授权信息中获得云网互通检测参数。For example, the authentication server can append access authentication information, cloud service authentication information, and cloud resource authorization parameters to the cloud-network interoperability detection request and send it to the cloud-network interoperability detection module, and the cloud-network interoperability detection module obtains the access authentication information, Cloud network interoperability detection parameters are obtained from the cloud service authentication information and cloud resource authorization information.

示例性的,云网互通检测模块可响应于所接收到的云网互通检测请求,根据上个检测周期的历史检测记录生成云网互通检测参数。Exemplarily, the cloud-network interoperability detection module may respond to the received cloud-network interoperability detection request and generate cloud-network interoperability detection parameters based on the historical detection records of the previous detection cycle.

示例性的,云网互通检测模块可响应于所接收到的云网互通检测请求,从管理和维护用户的云互通检测参数的外部系统或通过外部API配置获得云网互通检测参数。Exemplarily, the cloud-network interoperability detection module may, in response to the received cloud-network interoperability detection request, obtain the cloud-network interoperability detection parameters from an external system that manages and maintains the user's cloud interoperability detection parameters or through external API configuration.

其中,上述认证服务器或云网互通检测模块从接入认证信息、云业务认证信息、云资源授权参数中获取云网互通检测参数时,认证服务器或云网互通检测模块可以从接入认证信息中获得源端参数,例如接入网关的IP地址;可以从云资源授权参数中获得目的端检测参数,例如云资源池访问端的IP地址。Among them, when the above-mentioned authentication server or cloud-network interoperability detection module obtains the cloud-network interoperability detection parameters from the access authentication information, cloud service authentication information, and cloud resource authorization parameters, the authentication server or cloud-network interoperability detection module can obtain the cloud-network interoperability detection parameters from the access authentication information. Obtain the source parameters, such as the IP address of the access gateway; obtain the destination detection parameters from the cloud resource authorization parameters, such as the IP address of the cloud resource pool access end.

上述过程中,认证服务器通过与云网互通检测模块的交互,实现了云网互通检测,能够确保云资源的可用性,进而提升用户的云资源访问体验。In the above process, the authentication server realizes cloud network interoperability detection through interaction with the cloud network interoperability detection module, which can ensure the availability of cloud resources and thereby improve the user's cloud resource access experience.

在一种可选的实施方式中,云网互通检测模块在接收到云网互通检测请求后,初始化用户终端的检测记录;根据云网互通检测参数确定云网互通检测策略;向接入网关下发云资源池访问端的参数信息以及云网互通检测策略,以使接入网关基于云网互通检测策略向云资源池访问端发起云网互通检测,并向云网互通检测模块返回云网互通检测结果。In an optional implementation, after receiving the cloud-network interoperability detection request, the cloud-network interoperability detection module initializes the detection record of the user terminal; determines the cloud-network interoperability detection strategy according to the cloud-network interoperability detection parameters; and downloads the download to the access gateway. Send the parameter information of the cloud resource pool access end and the cloud network interoperability detection strategy, so that the access gateway initiates the cloud network interoperability detection to the cloud resource pool access end based on the cloud network interoperability detection strategy, and returns the cloud network interoperability detection to the cloud network interoperability detection module result.

上述过程中,云网互通检测模块通过与接入网关之间的交互,实现了接入网关与云资源池访问端之间的互通检测,通过检测和维护接入网关与云资源池访问端之间的网络连通性,确保经过授权的云资源业务可以被用户终端访问。In the above process, the cloud network interoperability detection module realizes interoperability detection between the access gateway and the cloud resource pool access end through interaction with the access gateway. By detecting and maintaining the interoperability between the access gateway and the cloud resource pool access end, Network connectivity between cloud resources ensures that authorized cloud resource services can be accessed by user terminals.

此外,云网互通检测模块还可以根据本缓存确定用户终端的云网互通检测策略;云网互通检测模块还可以通过对外API端口由外部设备配置用户终端的云网互通检测策略。In addition, the cloud-network interoperability detection module can also determine the cloud-network interoperability detection strategy of the user terminal based on this cache; the cloud-network interoperability detection module can also configure the cloud-network interoperability detection strategy of the user terminal from an external device through the external API port.

在一种可选的实施方式中,接收云网互通检测模块返回的用户终端所对应的云网互通检测结果,并将用户终端所对应的云网互通检测结果返回给接入网关,以使接入网关根据云网互通检测结果进行配置。In an optional implementation, the cloud network interoperability detection result corresponding to the user terminal returned by the cloud network interoperability detection module is received, and the cloud network interoperability detection result corresponding to the user terminal is returned to the access gateway, so that the access gateway The ingress gateway is configured based on the cloud network interoperability detection results.

上述过程中,认证服务器通过向接入网关反馈云网互通检测结果,可以提示接入网关经过认证授权后的用户终端可以访问云资源池访问端。During the above process, the authentication server can feedback the cloud-network interoperability detection results to the access gateway to prompt the access gateway that the user terminal that has been authenticated and authorized can access the cloud resource pool access terminal.

在一种可选的实施方式中,在接收到云业务认证模块所返回的云业务认证结果以及云资源授权参数、云网互通检测模块所返回的云网互通检测结果后,认证服务器可以根据接入认证结果、接入授权参数、云业务认证结果以及云资源授权参数,生成授权信息,并将授权信息返回给接入网关。In an optional implementation, after receiving the cloud service authentication result returned by the cloud service authentication module, the cloud resource authorization parameters, and the cloud network interoperability detection result returned by the cloud network interoperability detection module, the authentication server can receive Input authentication results, access authorization parameters, cloud service authentication results and cloud resource authorization parameters, generate authorization information, and return the authorization information to the access gateway.

该授权信息可以根据TLV(Tag、length、value,属性类型、长度、值)格式进行定义。其中,属性类型可用于描述认证服务器返回给接入网关的授权信息的类型,可包括但不限于以下类型:用户身份标识、接入业务标识、接入用户的IP地址、云业务标识、云资源授权参数(如vCPU、内存、磁盘大小)、云网互通检测参数(封装类型、接入网关IP地址、云资源池访问端地址等)、云网互通检测结果等。长度可用于描述相应属性类型所对应的属性值的长度。值可用于描述相应属性类型所对应的属性值。The authorization information can be defined according to the TLV (Tag, length, value, attribute type, length, value) format. Among them, the attribute type can be used to describe the type of authorization information returned by the authentication server to the access gateway, which can include but is not limited to the following types: user identity identifier, access service identifier, access user's IP address, cloud service identifier, cloud resource Authorization parameters (such as vCPU, memory, disk size), cloud network interoperability detection parameters (encapsulation type, access gateway IP address, cloud resource pool access end address, etc.), cloud network interoperability detection results, etc. Length can be used to describe the length of the attribute value corresponding to the corresponding attribute type. Values can be used to describe the attribute value corresponding to the corresponding attribute type.

认证服务器向接入网关返回授权信息时,所采用的传输协议可以包括但不限于Radius(Remote Authentication Dial-In User Server,远程认证拨号用户服务)协议。When the authentication server returns authorization information to the access gateway, the transmission protocol used may include but is not limited to the Radius (Remote Authentication Dial-In User Server, Remote Authentication Dial-In User Service) protocol.

在一种可选的实施方式中,还提供一种用户认证授权的交互实例图,如图6所示。In an optional implementation, an interaction example diagram of user authentication and authorization is also provided, as shown in Figure 6 .

认证服务器可执行步骤S601:响应于接收到由接入网关发送的认证请求,进行用户终端的接入认证;向云业务认证模块发起云业务认证请求;向云网互通检测模块发起云网互通检测请求;The authentication server may perform step S601: in response to receiving the authentication request sent by the access gateway, perform access authentication of the user terminal; initiate a cloud service authentication request to the cloud service authentication module; initiate cloud network interoperability detection to the cloud network interoperability detection module ask;

云业务认证模块可执行步骤S602:基于云业务认证请求获得云业务认证参数,并根据云业务认证参数进行用户终端的云业务认证,将云业务认证结果以及云资源授权参数返回给认证服务器;The cloud service authentication module can perform step S602: obtain cloud service authentication parameters based on the cloud service authentication request, perform cloud service authentication of the user terminal according to the cloud service authentication parameters, and return the cloud service authentication results and cloud resource authorization parameters to the authentication server;

云网互通检测模块可执行步骤S603:基于云网互通检测请求获得云网互通检测参数,并根据云网互通检测参数进行用户终端的云网互通检测,将云网互通检测结果返回给认证服务器;The cloud-network interoperability detection module can perform step S603: obtain cloud-network interoperability detection parameters based on the cloud-network interoperability detection request, perform cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection parameters, and return the cloud-network interoperability detection results to the authentication server;

认证服务器可执行步骤S604:基于接入认证结果、接入授权参数、云业务认证结果、云资源授权参数以及云网互通检测结果,确定授权信息,向接入网关返回授权信息,以使接入网关完成本地配置。The authentication server may perform step S604: determine the authorization information based on the access authentication results, access authorization parameters, cloud service authentication results, cloud resource authorization parameters and cloud network interoperability detection results, and return the authorization information to the access gateway to enable access The gateway completes local configuration.

上述过程,在用户发起认证时,认证服务器完成接入认证和云业务认证、云网互通检测,并在认证服务器返回的授权信息中携带接入授权参数、云资源授权参数、云网互通检测结果,打通接入业务和云业务的认证流程,接入网关根据授权信息完成配置,可以简化用户业务使用流程,增强用户使用云业务的便利性、安全性,进而催化云网业务的快速、健康发展。In the above process, when the user initiates authentication, the authentication server completes the access authentication, cloud service authentication, and cloud-network interoperability detection, and carries the access authorization parameters, cloud resource authorization parameters, and cloud-network interoperability detection results in the authorization information returned by the authentication server. , open up the authentication process of access business and cloud business, and the access gateway completes the configuration according to the authorization information, which can simplify the user's business use process, enhance the convenience and security of users' use of cloud business, and thus catalyze the rapid and healthy development of cloud network business .

本公开的示例性实施方式还提供一种用户认证授权处理装置,应用于网络接入和云业务认证及云资源授权,如图7所示,该用户认证授权处理装置700可以包括:Exemplary embodiments of the present disclosure also provide a user authentication and authorization processing device, which is applied to network access and cloud service authentication and cloud resource authorization. As shown in Figure 7, the user authentication and authorization processing device 700 may include:

接入认证模块710,用于响应于接收到由接入网关发送的认证请求,进行用户终端的接入认证,其中认证请求由用户终端生成并发送至接入网关;The access authentication module 710 is configured to perform access authentication of the user terminal in response to receiving an authentication request sent by the access gateway, where the authentication request is generated by the user terminal and sent to the access gateway;

云业务认证发起模块720,用于向云业务认证模块发起云业务认证请求,以使云业务认证模块基于云业务认证请求进行用户终端的云业务认证;The cloud service authentication initiation module 720 is configured to initiate a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request;

云网互通检测发起模块730,用于向云网互通检测模块发起云网互通检测请求,以使云网互通检测模块基于云网互通检测请求进行用户终端的云网互通检测。The cloud-network interoperability detection initiating module 730 is configured to initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection request.

在一种可选的实施方式中,云业务认证发起模块720,可以被配置为:向云业务认证 模块发送云业务认证请求,以使云业务认证模块基于云业务认证请求获得云业务认证参数,并根据云业务认证参数进行用户终端的云业务认证。In an optional implementation, the cloud service authentication initiation module 720 may be configured to: send a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module obtains the cloud service authentication parameters based on the cloud service authentication request, And perform cloud service authentication of the user terminal according to the cloud service authentication parameters.

在一种可选的实施方式中,云业务认证模块在接收到云业务认证请求后,可以初始化用户终端对应的云业务认证信息,并根据云业务认证信息完成用户终端的云业务认证,获得云资源授权参数,并向认证服务器返回云业务认证结果以及云资源授权参数。In an optional implementation, after receiving the cloud service authentication request, the cloud service authentication module can initialize the cloud service authentication information corresponding to the user terminal, and complete the cloud service authentication of the user terminal based on the cloud service authentication information to obtain the cloud service authentication request. Resource authorization parameters, and returns the cloud service authentication results and cloud resource authorization parameters to the authentication server.

在一种可选的实施方式中,云网互通检测发起模块730,可以被配置为:向云网互通检测模块发起云网互通检测请求,以使云网互通检测模块基于云网互通检测请求获得云网互通检测参数,并根据云网互通检测参数进行用户终端的云网互通检测。In an optional implementation, the cloud-network interoperability detection initiating module 730 may be configured to: initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module obtains data based on the cloud-network interoperability detection request. Cloud network interoperability detection parameters, and cloud network interoperability detection of user terminals is performed based on the cloud network interoperability detection parameters.

在一种可选的实施方式中,云网互通检测模块在接收到云网互通检测请求后,初始化用户终端的检测记录,并根据云网互通检测参数确定云网互通检测策略,并向接入网关下发云资源池访问端的参数信息以及云网互通检测策略,以使接入网关基于云网互通检测策略向云资源池访问端发起云网互通检测,并向云网互通检测模块返回云网互通检测结果。In an optional implementation manner, after receiving the cloud-network interoperability detection request, the cloud-network interoperability detection module initializes the detection record of the user terminal, determines the cloud-network interoperability detection strategy according to the cloud-network interoperability detection parameters, and reports to the access The gateway delivers the parameter information of the cloud resource pool access end and the cloud network interoperability detection policy, so that the access gateway initiates cloud network interoperability detection to the cloud resource pool access end based on the cloud network interoperability detection policy, and returns the cloud network interoperability detection module to the cloud network interoperability detection module. Exchange test results.

在一种可选的实施方式中,若用户终端的接入认证通过,该用户认证授权处理装置700,还可以包括:接入认证反馈模块,用于将用户终端所对应的接入认证结果以及接入授权参数返回给接入网关,以使接入网关根据接入认证结果以及接入授权参数进行配置。In an optional implementation, if the access authentication of the user terminal passes, the user authentication and authorization processing device 700 may also include: an access authentication feedback module, configured to obtain the access authentication result corresponding to the user terminal and The access authorization parameters are returned to the access gateway, so that the access gateway can configure based on the access authentication results and the access authorization parameters.

在一种可选的实施方式中,若用户终端的云业务认证通过,该用户认证授权处理装置700,还可以包括:云业务认证反馈模块,该云业务认证反馈模块可以被配置为:接收云业务认证模块返回的用户终端所对应的云业务认证结果以及云资源授权参数;将用户终端所对应的云业务认证结果以及云资源授权参数返回给接入网关,以使接入网关根据云业务认证结果以及云资源授权参数进行配置。In an optional implementation, if the cloud service authentication of the user terminal passes, the user authentication and authorization processing device 700 may also include: a cloud service authentication feedback module, and the cloud service authentication feedback module may be configured to: receive cloud service authentication. The service authentication module returns the cloud service authentication result and cloud resource authorization parameters corresponding to the user terminal; returns the cloud service authentication result and cloud resource authorization parameters corresponding to the user terminal to the access gateway, so that the access gateway can authenticate according to the cloud service Configure the results and cloud resource authorization parameters.

在一种可选的实施方式中,该用户认证授权处理装置700,还可以包括:互通检测反馈模块,用于接收云网互通检测模返回的用户终端所对应的云网互通检测结果,并将用户终端所对应的云网互通检测结果返回给接入网关,以使接入网关根据云网互通检测结果进行配置。In an optional implementation, the user authentication and authorization processing device 700 may also include: an interoperability detection feedback module, configured to receive the cloud-network interoperability detection result corresponding to the user terminal returned by the cloud-network interoperability detection module, and The cloud network interoperability detection result corresponding to the user terminal is returned to the access gateway, so that the access gateway performs configuration according to the cloud network interoperability detection result.

上述用户认证授权处理装置700中各部分的具体细节在方法部分实施方式中已经详细说明,未披露的细节内容可以参见方法部分的实施方式内容,因而不再赘述。The specific details of each part of the above-mentioned user authentication and authorization processing device 700 have been described in detail in the implementation of the method part. For undisclosed details, please refer to the implementation of the method part, so they will not be described again.

本公开的示例性实施方式还提供了一种计算机可读存储介质,其上存储有能够实现本说明书上述用户认证授权处理方法的程序产品。在一些可能的实施方式中,本公开的各个方面还可以实现为一种程序产品的形式,其包括程序代码,当程序产品在电子设备上运行时,程序代码用于使电子设备执行本说明书上述“示例性方法”部分中描述的根据本公开各种示例性实施方式的步骤。该程序产品可以采用便携式紧凑盘只读存储器(CD-ROM)并包括程序代码,并可以在电子设备,例如个人电脑上运行。然而,本公开的程序产品不限于此,在本文件中,可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。Exemplary embodiments of the present disclosure also provide a computer-readable storage medium on which a program product capable of implementing the user authentication and authorization processing method described above in this specification is stored. In some possible implementations, various aspects of the present disclosure can also be implemented in the form of a program product, which includes program code. When the program product is run on an electronic device, the program code is used to cause the electronic device to execute the above-mentioned instructions in this specification. The steps according to various exemplary embodiments of the present disclosure are described in the "Exemplary Methods" section. The program product may take the form of a portable compact disk read-only memory (CD-ROM) and include the program code, and may be run on an electronic device, such as a personal computer. However, the program product of the present disclosure is not limited thereto. In this document, a readable storage medium may be any tangible medium containing or storing a program that may be used by or in conjunction with an instruction execution system, apparatus, or device.

程序产品可以采用一个或多个可读介质的任意组合。可读介质可以是可读信号介质或 者可读存储介质。可读存储介质例如可以为但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。The Program Product may take the form of one or more readable media in any combination. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device or device, or any combination thereof. More specific examples (non-exhaustive list) of readable storage media include: electrical connection with one or more conductors, portable disk, hard disk, random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.

计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了可读程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。可读信号介质还可以是可读存储介质以外的任何可读介质,该可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。A computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave carrying readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above. A readable signal medium may also be any readable medium other than a readable storage medium that can send, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or device.

可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于无线、有线、光缆、RF等等,或者上述的任意合适的组合。Program code embodied on a readable medium may be transmitted using any suitable medium, including but not limited to wireless, wireline, optical cable, RF, etc., or any suitable combination of the foregoing.

可以以一种或多种程序设计语言的任意组合来编写用于执行本公开操作的程序代码,程序设计语言包括面向对象的程序设计语言—诸如Java、C++等,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在目标用户设备上执行、作为一个独立的软件包执行、部分在用户计算设备上部分在远程计算设备上执行、或者完全在远程计算设备或服务器上执行。在涉及远程计算设备的情形中,远程计算设备可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算设备,或者,可以连接到外部计算设备(例如利用因特网服务提供商来通过因特网连接)。Program code for performing the operations of the present disclosure may be written in any combination of one or more programming languages, including object-oriented programming languages such as Java, C++, etc., as well as conventional procedural programming. Language—such as "C" or a similar programming language. The program code may execute entirely on the user's computing device, partly on the target user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or executed on the server. In situations involving remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device, such as provided by an Internet service. (business comes via Internet connection).

本公开的示例性实施方式还提供了一种能够实现上述用户认证授权处理方法的电子设备。下面参照图8来描述根据本公开的这种示例性实施方式的电子设备800。图8显示的电子设备800仅仅是一个示例,不应对本公开实施方式的功能和使用范围带来任何限制。Exemplary embodiments of the present disclosure also provide an electronic device capable of implementing the above user authentication and authorization processing method. An electronic device 800 according to such an exemplary embodiment of the present disclosure is described below with reference to FIG. 8 . The electronic device 800 shown in FIG. 8 is only an example and should not bring any limitations to the functions and usage scope of the embodiments of the present disclosure.

如图8所示,电子设备800可以以通用计算设备的形式表现。电子设备800的组件可以包括但不限于:至少一个处理单元810、至少一个存储单元820、连接不同系统组件(包括存储单元820和处理单元810)的总线830和显示单元840。As shown in Figure 8, electronic device 800 may take the form of a general-purpose computing device. The components of the electronic device 800 may include, but are not limited to: at least one processing unit 810, at least one storage unit 820, a bus 830 connecting different system components (including the storage unit 820 and the processing unit 810), and a display unit 840.

存储单元820存储有程序代码,程序代码可以被处理单元810执行,使得处理单元810执行本说明书上述“示例性方法”部分中描述的根据本公开各种示例性实施方式的步骤,以确保云资源的可用性并提高用户使用云业务的便利性。The storage unit 820 stores program code, which can be executed by the processing unit 810, so that the processing unit 810 performs the steps according to various exemplary embodiments of the present disclosure described in the "Example Method" section of this specification to ensure cloud resources. availability and improve users’ convenience in using cloud services.

具体的,处理单元810可执行以下步骤:Specifically, the processing unit 810 can perform the following steps:

响应于接收到由接入网关发送的认证请求,进行用户终端的接入认证,其中认证请求由用户终端生成并发送至接入网关;In response to receiving the authentication request sent by the access gateway, perform access authentication of the user terminal, wherein the authentication request is generated by the user terminal and sent to the access gateway;

向云业务认证模块发起云业务认证请求,以使云业务认证模块基于云业务认证请求进行用户终端的云业务认证;Initiate a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request;

向云网互通检测模块发起云网互通检测请求,以使云网互通检测模块基于云网互通检 测请求进行用户终端的云网互通检测。Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection request.

在一种可选的实施方式中,上述向云业务认证模块发起云业务认证请求,以使云业务认证模块基于云业务认证请求进行用户终端的云业务认证,可包括以下步骤:向云业务认证模块发送云业务认证请求,以使云业务认证模块基于云业务认证请求获得云业务认证参数,并根据云业务认证参数进行用户终端的云业务认证。In an optional implementation, the above-mentioned initiating a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request, may include the following steps: Authentication to the cloud service The module sends a cloud service authentication request, so that the cloud service authentication module obtains cloud service authentication parameters based on the cloud service authentication request, and performs cloud service authentication of the user terminal based on the cloud service authentication parameters.

在一种可选的实施方式中,云业务认证模块在接收到云业务认证请求后,可以初始化用户终端对应的云业务认证信息,并根据云业务认证信息完成用户终端的云业务认证,获得云资源授权参数,并向认证服务器返回云业务认证结果以及云资源授权参数。In an optional implementation, after receiving the cloud service authentication request, the cloud service authentication module can initialize the cloud service authentication information corresponding to the user terminal, and complete the cloud service authentication of the user terminal based on the cloud service authentication information to obtain the cloud service authentication request. Resource authorization parameters, and returns the cloud service authentication results and cloud resource authorization parameters to the authentication server.

在一种可选的实施方式中,上述向云网互通检测模块发起云网互通检测请求,以使云网互通检测模块基于云网互通检测请求进行用户终端的云网互通检测,可包括以下步骤:向云网互通检测模块发起云网互通检测请求,以使云网互通检测模块基于云网互通检测请求获得云网互通检测参数,并根据云网互通检测参数进行用户终端的云网互通检测。In an optional implementation, the above-mentioned initiating a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection of the user terminal based on the cloud-network interoperability detection request, may include the following steps : Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module obtains the cloud-network interoperability detection parameters based on the cloud-network interoperability detection request, and performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection parameters.

在一种可选的实施方式中,云网互通检测模块在接收到云网互通检测请求后,可初始化用户终端的检测记录,并根据云网互通检测参数确定云网互通检测策略,并向接入网关下发云资源池访问端的参数信息以及云网互通检测策略,以使接入网关基于云网互通检测策略向云资源池访问端发起云网互通检测,并向云网互通检测模块返回云网互通检测结果。In an optional implementation, after receiving the cloud-network interoperability detection request, the cloud-network interoperability detection module can initialize the detection record of the user terminal, determine the cloud-network interoperability detection strategy according to the cloud-network interoperability detection parameters, and provide the The ingress gateway delivers the parameter information of the cloud resource pool access end and the cloud network interoperability detection policy, so that the access gateway initiates cloud network interoperability detection to the cloud resource pool access end based on the cloud network interoperability detection policy, and returns the cloud network interoperability detection strategy to the cloud network interoperability detection module. Network interoperability test results.

在一种可选的实施方式中,若用户终端的接入认证通过,还可执行以下步骤:将用户终端所对应的接入认证结果以及接入授权参数返回给接入网关,以使接入网关根据接入认证结果以及接入授权参数进行配置。In an optional implementation, if the access authentication of the user terminal passes, the following steps may also be performed: returning the access authentication result and access authorization parameters corresponding to the user terminal to the access gateway, so that the access The gateway is configured based on the access authentication results and access authorization parameters.

在一种可选的实施方式中,若用户终端的云业务认证通过,还可执行以下步骤:接收云业务认证模块返回的用户终端所对应的云业务认证结果以及云资源授权参数;将用户终端所对应的云业务认证结果以及云资源授权参数返回给接入网关,以使接入网关根据云业务认证结果以及云资源授权参数进行配置。In an optional implementation, if the cloud service authentication of the user terminal passes, the following steps may also be performed: receiving the cloud service authentication result and cloud resource authorization parameters corresponding to the user terminal returned by the cloud service authentication module; The corresponding cloud service authentication result and cloud resource authorization parameters are returned to the access gateway, so that the access gateway performs configuration according to the cloud service authentication result and cloud resource authorization parameters.

在一种可选的实施方式中,还可执行以下步骤:接收云网互通检测模返回的用户终端所对应的云网互通检测结果,并将用户终端所对应的云网互通检测结果返回给接入网关,以使接入网关根据云网互通检测结果进行配置。In an optional implementation, the following steps may also be performed: receiving the cloud-network interoperability detection result corresponding to the user terminal returned by the cloud-network interoperability detection module, and returning the cloud-network interoperability detection result corresponding to the user terminal to the interface. Ingress gateway, so that the access gateway can be configured based on the cloud network interoperability detection results.

上述用户认证授权处理过程中,实现了接入认证、云业务认证以及云网互通检测间的协同。一方面,打通了接入业务与云业务的认证流程,在一定程度上简化用户业务使用流程,增强了用户使用云业务的便利性,且通过功能协同避免了认证信息碎片化所导致的安全问题,催化了云网业务的快速健康发展。另一方面,通过连通云网互通检测功能,进一步完善了用户认证授权机制,能够避免云业务的认证通道与访问通道不一致所导致的云资源无法访问的问题,进而确保云资源的可用性。During the above user authentication and authorization processing process, collaboration between access authentication, cloud service authentication, and cloud network interoperability detection is achieved. On the one hand, it unifies the authentication process of access business and cloud business, simplifies the user business use process to a certain extent, enhances the convenience for users to use cloud business, and avoids security issues caused by the fragmentation of authentication information through functional collaboration. , catalyzing the rapid and healthy development of cloud network business. On the other hand, through the cloud-network interoperability detection function, the user authentication and authorization mechanism is further improved, which can avoid the problem of inaccessibility of cloud resources caused by inconsistent authentication channels and access channels for cloud services, thereby ensuring the availability of cloud resources.

存储单元820可以包括易失性存储单元形式的可读介质,例如随机存取存储单元(RAM)821和/或高速缓存存储单元822,还可以进一步包括只读存储单元(ROM)823。The storage unit 820 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 821 and/or a cache storage unit 822, and may further include a read-only storage unit (ROM) 823.

存储单元820还可以包括具有一组(至少一个)程序模块825的程序/实用工具824, 这样的程序模块825包括但不限于:操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。Storage unit 820 may also include a program/utility 824 having a set of (at least one) program modules 825 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, Each of these examples, or some combination, may include the implementation of a network environment.

总线830可以为表示几类总线结构中的一种或多种,包括存储单元总线或者存储单元控制器、外围总线、图形加速端口、处理单元或者使用多种总线结构中的任意总线结构的局域总线。Bus 830 may be a local area representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or using any of a variety of bus structures. bus.

电子设备800也可以与一个或多个外部设备900(例如键盘、指向设备、蓝牙设备等)通信,还可与一个或者多个使得用户能与该电子设备800交互的设备通信,和/或与使得该电子设备800能与一个或多个其它计算设备进行通信的任何设备(例如路由器、调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口850进行。并且,电子设备800还可以通过网络适配器860与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图所示,网络适配器860通过总线830与电子设备800的其它模块通信。应当明白,尽管图中未示出,可以结合电子设备800使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。Electronic device 800 may also communicate with one or more external devices 900 (e.g., keyboard, pointing device, Bluetooth device, etc.), may also communicate with one or more devices that enable a user to interact with electronic device 800, and/or with Any device that enables the electronic device 800 to communicate with one or more other computing devices (eg, router, modem, etc.). This communication may occur through input/output (I/O) interface 850. Furthermore, the electronic device 800 may also communicate with one or more networks (eg, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through a network adapter 860. As shown, network adapter 860 communicates with other modules of electronic device 800 via bus 830. It should be understood that, although not shown in the figures, other hardware and/or software modules may be used in conjunction with electronic device 800, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives And data backup storage system, etc.

通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本公开实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、终端装置、或者网络设备等)执行根据本公开示例性实施方式的方法。Through the above description of the embodiments, those skilled in the art can easily understand that the example embodiments described here can be implemented by software, or can be implemented by software combined with necessary hardware. Therefore, the technical solution according to the embodiment of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , including several instructions to cause a computing device (which may be a personal computer, a server, a terminal device, a network device, etc.) to execute a method according to an exemplary embodiment of the present disclosure.

此外,上述附图仅是根据本公开示例性实施方式的方法所包括的处理的示意性说明,而不是限制目的。易于理解,上述附图所示的处理并不表明或限制这些处理的时间顺序。另外,也易于理解,这些处理可以是例如在多个模块中同步或异步执行的。In addition, the above-mentioned drawings are only schematic illustrations of processes included in the methods according to the exemplary embodiments of the present disclosure, and are not intended to be limiting. It is readily understood that the processes shown in the above figures do not indicate or limit the temporal sequence of these processes. In addition, it is also easy to understand that these processes may be executed synchronously or asynchronously in multiple modules, for example.

应当注意,尽管在上文详细描述中提及了用于动作执行的设备的若干模块或者单元,但是这种划分并非强制性的。实际上,根据本公开的示例性实施方式,上文描述的两个或更多模块或者单元的特征和功能可以在一个模块或者单元中具体化。反之,上文描述的一个模块或者单元的特征和功能可以进一步划分为由多个模块或者单元来具体化。It should be noted that although several modules or units of equipment for action execution are mentioned in the above detailed description, this division is not mandatory. In fact, according to exemplary embodiments of the present disclosure, the features and functions of two or more modules or units described above may be embodied in one module or unit. Conversely, the features and functions of one module or unit described above may be further divided into being embodied by multiple modules or units.

所属技术领域的技术人员能够理解,本公开的各个方面可以实现为系统、方法或程序产品。因此,本公开的各个方面可以具体实现为以下形式,即:完全的硬件实施方式、完全的软件实施方式(包括固件、微代码等),或硬件和软件方面结合的实施方式,这里可以统称为“电路”、“模块”或“系统”。本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其他实施方式。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施方式仅被视为示例性的,本公开的真正范围和精神由权利要求指出。Those skilled in the art will understand that various aspects of the present disclosure may be implemented as systems, methods, or program products. Therefore, various aspects of the present disclosure may be embodied in the following forms, namely: a complete hardware implementation, a complete software implementation (including firmware, microcode, etc.), or an implementation combining hardware and software aspects, which may be collectively referred to herein as "Circuit", "Module" or "System". Other embodiments of the present disclosure will be readily apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The present disclosure is intended to cover any variations, uses, or adaptations of the disclosure that follow the general principles of the disclosure and include common common sense or customary technical means in the technical field that are not disclosed in the disclosure. . It is intended that the specification and embodiments be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限定。It is to be understood that the present disclosure is not limited to the precise structures described above and illustrated in the accompanying drawings, and various modifications and changes may be made without departing from the scope thereof. The scope of the disclosure is limited only by the appended claims.

Claims (11)

一种用户认证授权处理方法,其中,应用于网络接入和云业务认证及云资源授权,所述方法包括:A user authentication and authorization processing method, which is applied to network access and cloud service authentication and cloud resource authorization. The method includes: 响应于接收到由接入网关发送的认证请求,进行用户终端的接入认证,其中所述认证请求由所述用户终端生成并发送至所述接入网关;In response to receiving an authentication request sent by the access gateway, perform access authentication of the user terminal, wherein the authentication request is generated by the user terminal and sent to the access gateway; 向云业务认证模块发起云业务认证请求,以使所述云业务认证模块基于所述云业务认证请求进行所述用户终端的云业务认证;Initiate a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request; 向云网互通检测模块发起云网互通检测请求,以使所述云网互通检测模块基于所述云网互通检测请求进行所述用户终端的云网互通检测。Initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection request. 根据权利要求1所述的方法,其中,所述向云业务认证模块发起云业务认证请求,以使所述云业务认证模块基于所述云业务认证请求进行所述用户终端的云业务认证,包括:The method according to claim 1, wherein the initiating a cloud service authentication request to the cloud service authentication module so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request includes: : 向云业务认证模块发送云业务认证请求,以使所述云业务认证模块基于所述云业务认证请求获得云业务认证信息,并根据所述云业务认证信息进行所述用户终端的云业务认证。Send a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module obtains cloud service authentication information based on the cloud service authentication request, and performs cloud service authentication of the user terminal based on the cloud service authentication information. 根据权利要求2所述的方法,其中,所述云业务认证模块在接收到所述云业务认证请求后,初始化所述用户终端对应的云业务认证信息,并根据所述云业务认证信息完成所述用户终端的云业务认证,获得云资源授权参数,并向所述认证服务器返回云业务认证结果以及所述云资源授权参数。The method according to claim 2, wherein after receiving the cloud service authentication request, the cloud service authentication module initializes the cloud service authentication information corresponding to the user terminal, and completes the required steps based on the cloud service authentication information. The cloud service authentication of the user terminal obtains cloud resource authorization parameters, and returns the cloud service authentication result and the cloud resource authorization parameters to the authentication server. 根据权利要求1所述的方法,其中,所述向云网互通检测模块发起云网互通检测请求,以使所述云网互通检测模块基于所述云网互通检测请求进行所述用户终端的云网互通检测,包括:The method according to claim 1, wherein the cloud network interoperability detection request is initiated to the cloud network interoperability detection module, so that the cloud network interoperability detection module performs the cloud network interoperability detection request of the user terminal based on the cloud network interoperability detection request. Network interoperability detection, including: 向云网互通检测模块发起云网互通检测请求,以使所述云网互通检测模块基于所述云网互通检测请求获得云网互通检测参数,并根据所述云网互通检测参数进行所述用户终端的云网互通检测。Initiating a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module obtains cloud-network interoperability detection parameters based on the cloud-network interoperability detection request, and performs user-related operations based on the cloud-network interoperability detection parameters. Terminal cloud-network interoperability detection. 根据权利要求4所述的方法,其中,所述云网互通检测模块在接收到所述云网互通检测请求后,初始化所述用户终端的检测记录,并根据所述云网互通检测参数确定云网互通检测策略,并向所述接入网关下发云资源池访问端的参数信息以及所述云网互通检测策略,以使所述接入网关基于所述云网互通检测策略向所述云资源池访问端发起云网互通检测,并向所述云网互通检测模块返回云网互通检测结果。The method according to claim 4, wherein after receiving the cloud network interoperability detection request, the cloud network interoperability detection module initializes the detection record of the user terminal, and determines the cloud network interoperability detection parameter according to the cloud network interoperability detection parameter. network interoperability detection strategy, and deliver the parameter information of the cloud resource pool access terminal and the cloud network interoperability detection strategy to the access gateway, so that the access gateway provides the cloud network interoperability detection strategy to the cloud resource based on the cloud network interoperability detection strategy. The pool access terminal initiates cloud-network interoperability detection and returns the cloud-network interoperability detection result to the cloud-network interoperability detection module. 根据权利要求1所述的方法,其中,若所述用户终端的接入认证通过,所述方法还包括:The method according to claim 1, wherein if the access authentication of the user terminal passes, the method further includes: 将所述用户终端所对应的接入认证结果以及接入授权参数返回给所述接入网关,以使所述接入网关根据所述接入认证结果以及所述接入授权参数进行配置。Return the access authentication result and access authorization parameters corresponding to the user terminal to the access gateway, so that the access gateway performs configuration according to the access authentication result and the access authorization parameters. 根据权利要求1所述的方法,其中,若所述用户终端的云业务认证通过,所述方法还包括:The method according to claim 1, wherein if the cloud service authentication of the user terminal passes, the method further includes: 接收所述云业务认证模块返回的所述用户终端所对应的云业务认证结果以及云资源授权参数;Receive the cloud service authentication result and cloud resource authorization parameters corresponding to the user terminal returned by the cloud service authentication module; 将所述用户终端所对应的所述云业务认证结果以及所述云资源授权参数返回给所述接入网关,以使所述接入网关根据所述云业务认证结果以及所述云资源授权参数进行配置。Return the cloud service authentication result and the cloud resource authorization parameter corresponding to the user terminal to the access gateway, so that the access gateway determines the cloud service authentication result and the cloud resource authorization parameter according to the cloud service authentication result and the cloud resource authorization parameter. to configure. 根据权利要求1所述的方法,其中,所述方法还包括:The method of claim 1, further comprising: 接收所述云网互通检测模块返回的所述用户终端所对应的云网互通检测结果,并将所述用户终端所对应的云网互通检测结果返回给所述接入网关,以使所述接入网关根据所述云网互通检测结果进行配置。Receive the cloud-network interoperability detection result corresponding to the user terminal returned by the cloud-network interoperability detection module, and return the cloud-network interoperability detection result corresponding to the user terminal to the access gateway, so that the access gateway The ingress gateway performs configuration according to the cloud network interoperability detection results. 一种用户认证授权处理装置,其中,应用于网络接入和云业务认证及云资源授权,所述装置包括:A user authentication and authorization processing device, which is used for network access and cloud service authentication and cloud resource authorization. The device includes: 接入认证模块,用于响应于接收到由接入网关发送的认证请求,进行用户终端的接入认证,其中所述认证请求由所述用户终端生成并发送至所述接入网关;An access authentication module, configured to perform access authentication of the user terminal in response to receiving an authentication request sent by the access gateway, wherein the authentication request is generated by the user terminal and sent to the access gateway; 云业务认证发起模块,用于向云业务认证模块发起云业务认证请求,以使所述云业务认证模块基于所述云业务认证请求进行所述用户终端的云业务认证;A cloud service authentication initiation module, configured to initiate a cloud service authentication request to the cloud service authentication module, so that the cloud service authentication module performs cloud service authentication of the user terminal based on the cloud service authentication request; 云网互通检测发起模块,用于向云网互通检测模块发起云网互通检测请求,以使所述云网互通检测模块基于所述云网互通检测请求进行所述用户终端的云网互通检测。A cloud-network interoperability detection initiating module is configured to initiate a cloud-network interoperability detection request to the cloud-network interoperability detection module, so that the cloud-network interoperability detection module performs cloud-network interoperability detection on the user terminal based on the cloud-network interoperability detection request. 一种计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现权利要求1至8任一项所述的方法。A computer-readable storage medium on which a computer program is stored, wherein the method of any one of claims 1 to 8 is implemented when the computer program is executed by a processor. 一种电子设备,其中,包括:An electronic device, including: 处理器;以及processor; and 存储器,用于存储所述处理器的可执行指令;memory for storing executable instructions for the processor; 其中,所述处理器配置为经由执行所述可执行指令来执行权利要求1至8任一项所述的方法。wherein the processor is configured to perform the method of any one of claims 1 to 8 via execution of the executable instructions.
PCT/CN2022/142487 2022-06-24 2022-12-27 User authentication and authorization method and apparatus, and medium and device Ceased WO2023246060A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210730355.0 2022-06-24
CN202210730355.0A CN115022074B (en) 2022-06-24 2022-06-24 User authentication authorization method, device, medium and equipment

Publications (1)

Publication Number Publication Date
WO2023246060A1 true WO2023246060A1 (en) 2023-12-28

Family

ID=83077367

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/142487 Ceased WO2023246060A1 (en) 2022-06-24 2022-12-27 User authentication and authorization method and apparatus, and medium and device

Country Status (2)

Country Link
CN (1) CN115022074B (en)
WO (1) WO2023246060A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022074B (en) * 2022-06-24 2024-10-11 中国电信股份有限公司 User authentication authorization method, device, medium and equipment
CN115567918A (en) * 2022-09-19 2023-01-03 中国银行股份有限公司 Resource message query method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194673A (en) * 2018-09-20 2019-01-11 江苏满运软件科技有限公司 Authentication method, system, equipment and storage medium based on authorized user message
CN114090975A (en) * 2021-10-28 2022-02-25 青岛海尔科技有限公司 Cloud database resource processing method and device, electronic equipment and storage medium
US20220141662A1 (en) * 2019-02-06 2022-05-05 Apple Inc. Enabling interactive service for cloud renderting gaming in 5g systems
CN115022074A (en) * 2022-06-24 2022-09-06 中国电信股份有限公司 User authentication and authorization method, device, medium and equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873449B (en) * 2012-12-18 2017-07-07 中国电信股份有限公司 Method for network access and system
EP2747350A1 (en) * 2012-12-21 2014-06-25 Telefónica, S.A. Method and system for access to cloud network services
FR3007551A1 (en) * 2013-06-25 2014-12-26 France Telecom METHOD AND SERVER FOR PROCESSING AN ACCESS QUERY FROM A TERMINAL TO A COMPUTER RESOURCE
CN108111473B (en) * 2016-11-24 2020-11-13 腾讯科技(深圳)有限公司 Unified management method, device and system for hybrid cloud
CN112153055B (en) * 2020-09-25 2023-04-18 北京百度网讯科技有限公司 Authentication method and device, computing equipment and medium
CN114372254B (en) * 2021-08-16 2023-03-24 中电长城网际系统应用有限公司 Multi-authentication authorization method under big data environment
CN114125023B (en) * 2021-11-12 2024-03-22 青岛海尔科技有限公司 Method and device for determining data connection, storage medium and electronic device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194673A (en) * 2018-09-20 2019-01-11 江苏满运软件科技有限公司 Authentication method, system, equipment and storage medium based on authorized user message
US20220141662A1 (en) * 2019-02-06 2022-05-05 Apple Inc. Enabling interactive service for cloud renderting gaming in 5g systems
CN114090975A (en) * 2021-10-28 2022-02-25 青岛海尔科技有限公司 Cloud database resource processing method and device, electronic equipment and storage medium
CN115022074A (en) * 2022-06-24 2022-09-06 中国电信股份有限公司 User authentication and authorization method, device, medium and equipment

Also Published As

Publication number Publication date
CN115022074A (en) 2022-09-06
CN115022074B (en) 2024-10-11

Similar Documents

Publication Publication Date Title
CN112968844B (en) Method and device for sending fragment message
WO2019000871A1 (en) Method and device for providing voice service, and server
US10645172B1 (en) Socket tunneling connections in a service provider environment
CN115150113A (en) Method for accessing intranet application and related equipment
US9591081B2 (en) Virtual desktop access using wireless devices
WO2017101265A1 (en) Message processing method, processing server, terminal and storage medium
WO2023246060A1 (en) User authentication and authorization method and apparatus, and medium and device
CN115134553A (en) Data transmission method and device, electronic equipment and storage medium
CN116887420A (en) Data transmission method, device, electronic equipment and computer-readable storage medium
CN114448703B (en) Request processing method, request processing device, electronic equipment and storage medium
CN117194068A (en) Cross-process data transmission method, system, equipment and storage medium
CN114338496B (en) Resource forwarding method, device, terminal and computer storage medium
CN103051679B (en) Data transmission method and interface equipment, cloud optimal control equipment
CN103220235A (en) Distributed virtual switcher management method, relevant device and relevant system
CN114979305B (en) Communication method, device, equipment, storage medium and program product
US20250063081A1 (en) Method, apparatus, computer device, and storage medium for linkage parameter configuration
WO2024066939A1 (en) Multicast communication method for virtual network group, communication system, and related device
WO2024022400A1 (en) Cloud resource configuration method and related device
WO2024119917A1 (en) Sensing measurement method and apparatus, and related device
CN115834237A (en) Method, device, equipment, medium and system for issuing access control list policy
CN116261175A (en) Application access method and device based on edge calculation, electronic equipment and medium
HK40066462A (en) Streaming media transmission method and system, equipment and storage medium
CN116707988A (en) Authentication method, device, computer equipment and medium based on unified gateway system
CN115811474A (en) A method for binding an Internet of Things device, a terminal, and an Internet of Things device
CN116389192A (en) Data transmission architecture and its method, device and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22947795

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22947795

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16/07/2025)